PRIMARY THREATS TO INFORMATION
                SYSTEMS

•   Natural Disasters
•   Accidents
•   Employees/Consultants
•   Links to Outside Business Contacts
•   Outsiders
COMPUTER CRIME

• Definition: Act of using a computer to commit an illegal act
   • Targeting a computer
   • Using a computer to commit a crime
   • Using a computer to support criminal activity
• Estimated worldwide losses in 2006: $13.3 B
FEDERAL AND STATE LAWS

• Computer Fraud and Abuse Act of 1986
• Electronic Communications Privacy Act
• Are current laws effective?
HACKERS

• Definition: Individuals who gain access to computer systems
• Hackers vs. Crackers
• Hacktevists
UNAUTHORIZED ACCESS

• Using company computer for personal business
• Breaking into government websites to change information
• Stealing credit card information and/or Social Security numbers for
  personal gain
MALWARE

•   Viruses
•   Worms
•   Trojan Horse
•   Logic Bombs
•   Spyware
•   Spam (and Spim)

Chapter 10, part 3

  • 1.
    PRIMARY THREATS TOINFORMATION SYSTEMS • Natural Disasters • Accidents • Employees/Consultants • Links to Outside Business Contacts • Outsiders
  • 2.
    COMPUTER CRIME • Definition:Act of using a computer to commit an illegal act • Targeting a computer • Using a computer to commit a crime • Using a computer to support criminal activity • Estimated worldwide losses in 2006: $13.3 B
  • 3.
    FEDERAL AND STATELAWS • Computer Fraud and Abuse Act of 1986 • Electronic Communications Privacy Act • Are current laws effective?
  • 4.
    HACKERS • Definition: Individualswho gain access to computer systems • Hackers vs. Crackers • Hacktevists
  • 5.
    UNAUTHORIZED ACCESS • Usingcompany computer for personal business • Breaking into government websites to change information • Stealing credit card information and/or Social Security numbers for personal gain
  • 6.
    MALWARE • Viruses • Worms • Trojan Horse • Logic Bombs • Spyware • Spam (and Spim)

Editor's Notes