what you don't know can hurt you

cmpucrim.html

cmpucrim.html
Posted Aug 17, 1999

No information is available for this file.

tags | paper
MD5 | 86c46667d109c84fb05ee257d8c39741

cmpucrim.html

Change Mirror Download
<HTML>

<CENTER>

<H1>A Characteristic Model of <BR>
Computer Criminals</B></FONT>
<H3>by Ehud Avner</H3></H1>
</CENTER>
<P>
<FONT FACE="Arial, Helvetica, Swiss" Size=2>

<!-- MAIN BODY -->
<!-- ------------------------------------------------------------------------------ -->

Recent personality analysis conducted in several countries enabled
the construction of a model of character traits typical to computer
criminals.
<P>
The model refers mainly to information systems department employees
and users of on-line computer services.

<CENTER><H3>The Model</H3>
<TABLE BORDER=1>
<TR><TD>Age</TD>
<TD>18 - 35 years old</TD></TR>

<TR><TD>Gender</TD>
<TD>Mostly male</TD></TR>

<TR><TD>Position</TD>
<TD>Manager or a high ranking clerk</TD></TR>

<TR><TD valign=top>Traits</TD>
<TD>Bright, thorough, highly-motivated, diligent, trustworthy - the
last to be considered suspect, hard working, stable, first to
arrive and last to go, does not take vacations, apprehensive of
intimate relationships and of losing prestige, individualist,
solves problems independently.</TD></TR>

<TR><TD>Criminal Record</TD>
<TD>None</TD></TR>

<TR><TD valign=top>The Methods</TD>
<TD>Executing an apparently ordinary action in the course of normal
and legal system operations such as: salary calculations,
payments to suppliers, insurance payments, transferal of tax and
V.A.T returns etc.</TD></TR>

<TR><TD valign=top>Aftermath Reaction</TD>
<TD>It is not a crime, I hurt no one, everybody does that, the banks
steal more, I only tried to prove to my employers that it is
possible.</TD></TR>

<TR><TD valign=top>The Law</TD>
<TD>Does not deal with it. Usually both sided compromise and the case
is kept silent.</TD></TR>
</TABLE>
<HR>
<P>
<H3>Computer Criminology</H3>
<P></CENTER>
In approaching the issue of computer crimes and criminals, it
is necessary to consider not only the technological aspects affecting
the computer environment, but also additional unique circumstances
which help create criminal options. Combining the system's environment
with specific circumstances provides a high risk setting from
which computer crimes evolve. Computer criminology rests on the
same premise as any other type of crime, namely:
<P>
<OL>
<LI> The possibility to gain wealth or achieve an illegal objective
easily and in a short time span.
<LI> A small chance of detection and a relatively lenient punishment
if caught.
<LI> Ample opportunity.
</OL>
<P>
The computer environment as a microcosm of modern society has
created several options for different types of computer crimes;
embezzlement, through the transfer of funds between accounts electronically,
fraud, through changing computations or omitting transactions,
information theft, through the access of data sources, and financial
damage through malicious disruption of the central computing system
of an organization.
<P>
Computer crimes and criminals are receiving increasing media coverage
due to the rising numbers of companies and governmental agencies
which are fully computerized and which give access to the system
to an ever-increasing number of employees. In spite of this increased
coverage, there is no clear indication of a strong negative societal
attitude towards this type of crime. The lack of a clear social
perception (norm) with regards to computer crimes could be attributable
to the fact that computer crimes are a relatively new phenomenon,
and public opinion is not yet sufficiently formulated. Other reasons
could result from the technical nature of the crime, which many
people lack an understanding of, and from the fact that frequently
companies which have been subjected to a computer crime prefer
not to publicize it in an attempt to minimize damages, and prevent
harm to their credibility.
<P>
Few countries incorporate sufficient laws to regulate computer
crimes. The drafting and enactment of such laws are hindered by
the complexity of the information technology environment and by
the difficulty in defining clearly terms such as "software"'
"electronic media" etc.
<P>
In order for an actual computer related crime to take place, several
factors must come into play. First, there must be an individual
with the technical abilities to plan and execute the crime. Second,
there are personal (subjective) grievances, which the perpetrator
believes can be righted by instigating the crime. Third, the perpetrator
must feel confident that the crime committed will be nearly impossible
to trace (the perfect crime illusion). Last, the intended criminal
must have ready and legitimate access to the system in both the
physical and the logical sense, and the crime must be perpetrated
in the course of ordinary system activity.
<P>
Computer crimes are hard to prevent, and yet prevention is possible
through a combination of controlling the access and use to the
system, and creating an "alert and prevent" policy directed
at system users. While access controlling methods are rarely foolproof,
security can be layered in such a way as to severely decrease
the likelihood of a crime and to deter would be criminals by creating
an auditing and monitoring system which will disclose the source,
time and nature of a violation in the system.
<P>
Computer crime prevention is hinged on the existence of regular
backups which enable comparisons of information, and more importantly,
restorations of systems to their correct state if they were maliciously
or accidentally disrupted or destroyed. Similarly, every organization
today which provides employees with access to information stored
on the system, has an obligation to install a security system
complete with access control, encryption options, privilege definitions
and monitoring options to deter and prevent would be computer
criminals.
<BR><BR>

<!-- END OF MAIN BODY -->
</FONT>

</TD></TR>
<TR><TD WIDTH=110 BGCOLOR=#C0FF80 VALIGN=TOP>

<FONT FACE="Times New Roman" SIZE=-1><I>
Copyright &copy; 1997 EliaShim</I>
</TD><TD COLSPAN=2></TD>
</TR>
</TABLE>
</BODY>
</HTML>
Login or Register to add favorites

File Archive:

May 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    14 Files
  • 2
    May 2nd
    3 Files
  • 3
    May 3rd
    1 Files
  • 4
    May 4th
    18 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    21 Files
  • 7
    May 7th
    15 Files
  • 8
    May 8th
    19 Files
  • 9
    May 9th
    1 Files
  • 10
    May 10th
    2 Files
  • 11
    May 11th
    18 Files
  • 12
    May 12th
    39 Files
  • 13
    May 13th
    15 Files
  • 14
    May 14th
    17 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    2 Files
  • 17
    May 17th
    2 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    21 Files
  • 20
    May 20th
    15 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    6 Files
  • 23
    May 23rd
    1 Files
  • 24
    May 24th
    1 Files
  • 25
    May 25th
    2 Files
  • 26
    May 26th
    23 Files
  • 27
    May 27th
    13 Files
  • 28
    May 28th
    18 Files
  • 29
    May 29th
    17 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close