Kamko 4

Computer Crimes

Crimes that create havoc inside a computer

•Trojan horses, computer viruses, and logic bomb fall into this category. A trojan horse is a set of unauthorized instructions hidden in a legitimate program, such as an operating system.
•The intent of trojan horse programmers is, by definition, malicious or criminal. The trojan horse is a carrier of computer viruses and logic bombs.
A virus is
•A Trojan horse that propagates versions of itself into other computer systems. A virus can result in the display of a harmless political message or in the devastating loss of all programs and data.
•A logic bomb is a Trojan horse that is executed when a certain set of conditions are met. For example …

Kamko 3

•For all practical purposes the abuse of this information has slipped out from under the legislative umbrella.
•Antiquated laws, combined with judicial unfamiliarity with computers, make policing, and prosecuting, abuses of the privacy of personal information difficult and, in many case, impossible.
Computer matching
•Computer matching is a procedure whereby separate databases are examined and individual common to both are identified.
•Computer matching has been referred to as Orwellian by some, while auditors think it is a great help in their jobs.
•The focus of most computer-matching application is to identify people engaged in wrong doing.
Securing the integrity of
personal information
•Computer experts feel that the integrity of personal data can be more secure in computer data bases than in file cabinets.
•They contend that we can continue to be masters and not victims if we implement proper safeguards for the maintenance and release of this information and enact effective legislation to cope with the abuse of it.

Kamko 2

Source of personal data

•Some people fear that computer-based record-keeping offers too much of an opportunity for the invansion of an individual’s privacy. There is indeed reason for concern.
•For example, credit-card users unknowingly leave a “trail” of activities and interest that, when examined and evaluated, can provide a rather comprehensive personal profile.
From this information,
•A good analyst could compile a very accurate picture of your lifestyle. On a more personal level, records are kept that detail the duration, time, and numbers of all your telephone calls.
Violating the privacy of
personal information
•Most will agree that the potential exists for abuse, but are these data being misused? Personal information has become the product of a growing industry.
•Companies have been formed that do nothing but sell information about people. The use of personal information for profit and other purposes is growing at such a rapid rate that ..

Kamko 1

There is nothing wrong with
this attitude

•But we must recognize that society has made a very real commitment to computers. Whether it is good or bad, society has reached the point of no return in its dependence on computers.
•On the more personal level, we are reluctant to forfeit the every day conveniences made possible by computers.
controversy
•Another world for computer … Intense controversy is a by-product of the computer revolution. The emotions of both the general public and the computer community run high on computer-related issues.
•THE MISUSE OF PERSONAL INFORMATION: Source of personal data, violating the privacy of personal information, computer matching, securing the integrity of personal information.

Kamko 0

Computers in Society

Computers

•Can we live without them? Reaching the point of no return. There are those who believe that a rapidly advancing computer technology exhibits little regard for the future of human race.
•They contend that computers are overused, misused, and generally detrimental to society. This group argues that the computer is …
•Dehumanizing and is slowly forcing society into a pattern of mass conformity. To be sure, the computer revolution is presenting society with complex problems, but they can be overcome.
•Computer and information system have enhanced our lifestyles to the point that most of us take them for granted.

Keamanan Komputer 9

The motives of those who

•Would infect a system with a virus run from electronic vandalism to revenge to terrorism. There is no monetary reward, only the “satisfaction” of knowing that their efforts have been very costly to individuals, companies, and governments.
•Viruses are serious problem. They have the potential of affecting an individual’s career and even destroying companies.
A company that loses its
•Accounts receivables records could be a candidate for bankruptcy. Anti-viral programs, also called vaccines, exist, but they can be circumvented by a persistent (and malicious) programmer.
•The best way to cope with viruses is to recognize that they exist and to take pre-cautionary measures.
For example
•One company requires micro users to turn off their micros and reload their personal copies of the operating system before each use.
•In the main-frame environment, system programmers must search continually for suspicious-looking programs and be particularly wary of downloading programs from computer systems outside the company.

Keamanan Komputer 8

•For example, a student with an infected applications disk might infect several other laboratory computers with a virus which, in turn, infects the applications software of other students.
•Software companies have unknowingly distributed viruses with their proprietary software products.
In the mini-computer and …
•Main-frame environment, viruses generally are spread from one computer network to another.
•In late 1988 a Cornell graduate student wrote a costly virus (causing over $ 20 million in damages) that infiltrated 6000 computer on six continents via worldwide computer network.
Since first appearing in …
•The mid-1980s, viruses have erased bank records, damaged hospital records, destroyed the program in thousands of micro-computers, and even infected part of the systems at NORAD (strategic defense) and NASA.
•Disgruntled employee have inserted viruses in disks that were distributed to customers.

Keamanan Komputer 7

There are many types of viruses.

•Some act quickly by erasing user programs and data bases. Others grow like a cancer, detroying small parts of a data base each day. Some act like a time bomb. They lay dormant for days or months, but eventually are activated and wreak havoc on any software on the system. Many companies warn their micro users to back up all software prior to every Friday the thirteenth.
Some viruses attack the hardware
•And have been known to throw the mechanical components of a computer system, such as disk-access arms, into costly spasms.
•The most common source of viral infection is the public electronic bulletin board on which users exchange software. Typically, a user logs onto the bulletin board and downloads what ..
He or she thinks is a game,
•A utility program, or some other enticing piece of freeware, but gets a virus instead. One virus frequently distributed via electronic bulletin boards displayed “Gotcha” on the user’s monitor, then erased all programs and data from accesible disk storage.
•Viruses are also spread from one system to an other via common diskettes.

Keamanan Komputer 6

To maintain odd parity,

•The extra parity bit is turned on when the seven-bit ASCII byte has an even number of on-bits. When the ASCII byte has an odd number of on-bits, the parity bit is turned off.
•The receiving device checks for this condition. A parity error occurs when an even number of on-bits is encountered. Some computer systems are designed to maintain even parity, but odd and even parity work in a similar manner.
In a manner of speaking,
•Computers get sick, too. A variety of highly contagious “diseases” can spread from computer to computer, much the way biological viruses do among human beings.
•A computer virus is a program that literally “infects” other programs and data bases upon contact. It can hide duplicates of itself within legitimate programs, such as an operating system or word processing program.
Virus programs
•Are written with malicious intent and are loaded to the computer system of an unsuspecting victim. Viruses have been found at all levels of computing, from micro-computers to super-computers; however, the micro-computer environment is particularly suceptible to virus infiltration because of the lack of system controls exercised by individual users.