...A Case Study on How to Manage the Theft of Information Robert M Polstra III Kennesaw State University 2004 Westwood Rd Smyrna, GA 30080 404-641-8937 rpolstra@hotmail.com ABSTRACT 1. INTRODUCTION This paper shows the importance that management plays in the protection of information and in the planning to handle a security breach when a theft of information happens. Recent thefts of information that have hit major companies have caused concern. These thefts were caused by companies’ inability to determine risks associated with the protection of their data and these companies lack of planning to properly manage a security breach when it occurs. It is becoming necessary, if not mandatory, for organizations to perform ongoing risk analysis to protect their systems. Organizations need to realize that the theft of information is a management issue as well as a technology one, and that these recent security breaches were mainly caused by business decisions by management and not a lack of technology. After counter-terrorism and counter-intelligence, cyber crime is the third highest priority for the U.S. Federal Bureau [4]. With the rise of the theft of information and the lure of big profits for this stolen information, it is necessary for information systems to have the ability to protect this valuable asset. It is estimated that a credit card number unsupported by any other documentation is worth $10, and a credit history report retails for $60 [2]...
Words: 3469 - Pages: 14
...Identity Theft: How Information Technology Has Made It Easier To Do IFSM201 Identity theft is not a new problem; it has actually been around for many years but with technology evolving by the minute it has made identity theft easier than ever before to do and almost get away with, leaving little to no traces. In the past the way to commit identity theft was to kill a person and assume their identity, this was way before photo ids were customary, during those times id theft wasn’t that prevalent. During the 50’s and 60’s with the invention of credit cards and Social Security Cards identity theft began to increase slightly, since most people carried their social security cards or passports in their wallets making it easy for thieves to steal and assume their identity; even though a thief may have had your personal information it still wasn’t easy for them to get credit without applying for it in person with photo identification or without the manager of the bank that was extending the credit vouching for you personally (History of Identity Theft) Obtaining credit now a days is a lot easier as long as you have the required information, even if that information is not yours, you no longer need a bank manager to vouch for you; this gives thieves more opportunities to get your information and make it their own. With the invention of the Internet and having just about every transaction we do transmitted electronically, identity thieves have the ability to...
Words: 1196 - Pages: 5
...Associate Level Material Critical Analysis Forms Fill out one form for each source. |Source 1 Title and Citation: Identity Theft Is a Serious Problem | |Swecker, C. (2009). Identity Theft Is a Problem (Cyber Crime ed.) Louise I. Gerdes. Detroit: Greenhaven Press. | | | | | |1 |Identify the principal issue presented by the |Identity theft has emerged as one of the dominant white collar crime | | |source. |problems of the twenty-first century | | | | | |2 |Identify any examples of bias presented by the |This particular article seemed bias free to me. The author did a good job of| | |author. If none exist, explain how you |producing statistics backing his claims. The author gives detailed | | |determined this. |information about the FBI internet crime numbers along with information | | | |regarding the Internet Crime Complain Center. I never felt that the author | | | |was...
Words: 1132 - Pages: 5
...Computer Crimes Computer Crimes Computer Crimes Advances in telecommunications and in computer technology have brought us to the information revolution. The rapid advancement of the telephone, cable, satellite and computer networks, combined with the help of technological breakthroughs in computer processing speed, and information storage, has lead us to the latest revolution, and also the newest style of crime, "computer crime". The following information will provide you with evidence that without reasonable doubt, computer crime is on the increase in the following areas: hackers, hardware theft, software piracy and the information highway. This information is gathered from expert sources such as researchers, journalists, and others involved in the field. Computer crimes are often heard a lot about in the news. When you ask someone why he/she robbed banks, they world replied, "Because that's where the money is." Today's criminals have learned where the money is. Instead of settling for a few thousand dollars in a bank robbery, those with enough computer knowledge can walk away from a computer crime with many millions. The National Computer Crimes Squad estimates that between 85 and 97 percent of computer crimes are not even detected. Fewer than 10 percent of all computer crimes are reported this is mainly because organizations fear that their employees, clients, and stockholders will lose faith in them if they admit that their computers have been attacked. And...
Words: 1814 - Pages: 8
...criminal activities which involve the use of information technology to get illegal or unauthorized access to a a computer system with the mind set of damaging, deleting, and altering computer data. Computer crimes are include but are not limited to electronic frauds, misuse of devices, identity theft and data. Computer crimes do not necessarily have to involve damage to physical property. The computer could have participated in the crime or may have been the target. There are for common types of computer crimes computer as the target, the computer as an instrument of a crime, the computer as incidental to a crime, and crimes associated with the prevalence of computers. Categories of Computer Crime There are four common types of computer crimes. Computers can be used as an target. Crimes were the computer is the can include offenses like theft of intellectual property, theft of marketing information or blackmail based on information gained from computerized files. Crimes of this nature can sabotage intellectual property, marketing, pricing, or personnel data or can even sabotage of operating systems and programs with the thought of creating chaos in a business operations. There are many ways computers can be targeted unlawful access to criminal justice and other government records is another crime that targets the computer directly. This type of crime you could change a criminal history, modifying warrant information, creating a driver’s license, passport, or...
Words: 802 - Pages: 4
...Assignment 1: Digital Computer Crime Information Technology in Criminal Justice Lashavia Davis Strayer University Professor Marina Stakic February 4, 2015 Computer crimes refer to any crime that involves a computer and a network, where unauthorized use of the computers where it may or may not have played an instrumental part in committing the crime. Computer crimes have a broad range of potentially illegal activities. It may be divided into one of two types of categories, “crimes that target computer networks or devices directly, and crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.’” Which we have four major categories that fit inside one of two types of categories; the computer as a target, the computer as Instrument of the crime, the computer as incidental to crime and crimes associated with the prevalence of computer. This computer crime used the computer as the target by accesses the operating program as the system’s manager, then deny the legitimate user or owner of the system access to his or her date or computer. When committing this crime we have four sub categories that the hacker may fall under, a network intruder who target the server and may cause harm to the network owners or the operation of their business, date alteration that directly targets the computer by attacking the useful information stored or processed by computer, malicious network...
Words: 1491 - Pages: 6
...The U.S. Department of Justice administers two statistical programs to measure the magnitude, nature, and impact of crime in the Nation: the Uniform Crime Reporting (UCR) Program and the National Crime Victimization Survey (NCVS). Each of these programs produces valuable information about aspects of the Nation’s crime problem. Because the UCR and NCVS programs are conducted for different purposes, use different methods, and focus on somewhat different aspects of crime, the information they produce together provides a more comprehensive panorama of the Nation’s crime problem than either could produce alone. The International Association of Chiefs of Police (IACP) began publishing information for the UCR Program in 1929, just two years after the IACP had established a committee to research the uniform reporting of crime statistics. Since September 1930, the FBI has administered the program and currently collects information on the following crimes: murder and non-negligent manslaughter, forcible rape, robbery, aggravated assault, burglary, larceny-theft, motor vehicle theft, and arson. Law enforcement agencies report arrest data for 21 additional crime categories. The UCR Program compiles data from monthly law enforcement reports or individual crime incident records transmitted directly to the FBI or to centralized state agencies that then report to the FBI. The program thoroughly examines each report it receives for reasonableness, accuracy...
Words: 417 - Pages: 2
...knowledge from its perpetrators. Cyber-crime is relatively new, however, has been in existence since the implementation of computers in mainstream society. This could be a general explanation as to why and how unprepared society and the world are towards fighting these types of crimes [ (Joseph, 2006) ]. There are numerous crimes of this nature being committed on a daily basis. Examples of cyber-crime where the computer itself is the target include things like data alteration, denial of network access, theft of information, denial of service, and vandalism. The next category that the author would like to point out is the computer as an instrument of a crime. What this means is that the computer is used to profit with some other criminal activity in mind. Some examples of this are general theft, theft of service, fraud, and threats and/or harassment [ (Taylor, Fritsch, Liederbach, & Holt, 2011) ]. The implementation of computers as a criminal tool or device to obtain information to be used in a criminal manner increases yearly. Criminals use computers to store data relating to drug deals, money laundering, embezzlement, mail fraud, extortion, and a myriad of other crimes. In addition to the simple storage of records, criminals also...
Words: 1361 - Pages: 6
...the research environment are most appropriate for our organizational problem. What data collection instrument(s) will be used? Survey? Interview? There are two methods of research in which we are preparing to use. One method of research is the observation method and the other is the focus group method. Both methods are an excellent choice when trying to take control of the losses of a business do to theft. The observation method which is sometime referred to as the field method will give Bloomingdale’s loss prevention team the ability to observer and gather first hand information from the loss prevention team on the behaviors of its employees’ theft problems and issues as well as the consumers. The biggest advantage of this method is that is gives the loss prevention teams an opportunity to participate in the survey. It also gives a greater validation to the information that was retrieved. The focus group works well with each individual loss prevention group because it gives them a opportunity to work closely together in small groups and will limit the amount of information to just the participants in the group. When using a focus group it is a little more expensive than a...
Words: 552 - Pages: 3
...Operation High Roller CSIA 301 November 23, 2014 New forms of cyber crime continue to come up all the time. Technology has aided the theft of money from bank accounts from banks from all over the world and one such cyber attack was Operation High Roller a cyber attack that targeted corporate bank accounts. According to The Wall Street Journal, these attacks which began in Europe spread to Latin America and even the United States (Booker 2012). The attackers did fraudulent transfer of money from accounts belonging to financial institutions. For instance, in the United States, the victims of the attack were companies whose commercial accounts had a minimum of several million dollars. The attackers sent SpyEye and Zeus software to hack computers that were infected with malware. This cyber attack has an extensive network and automation which interacts with serves that are used by their target victims. But much of the transactions are carried out in the servers used by the criminals. Two security firms, McAFee and Gurdian Analytic (Business Insider) were behind this discovery and they realized that there was no human participation required in the transactions. All the criminals needed were insider understanding of the goings on in the banking industry transaction systems. They then developed commercial and custom codes which they maliciously used to siphon millions of dollars into their virtual accounts. About sixty serves were identified as the ones used in making attempted...
Words: 1415 - Pages: 6
...Professor Gregorio Chavarria CIS Information Technology and Crime 15 January 2012 Defining computer crime effectively is a daunting and difficult task. Nevertheless there are four general categories of criminal crime, including (1) the computer as an instrument of crime, (2) the computer as a target, (3) the computer as incidental to crime, and (4) crimes associated with the prevalence of computers. (Taylor, & Fritsch, 2011) The first category, the computer as an instrument of crime is basically using the computer to facilitate the crime. The criminal introduces a program to manipulate the computer's analytical processes, thereby facilitating the crime. The computer is used to connect to networks so the criminal can do such crimes as fraud, theft of service, theft, threats and even harassment. Another method involves converting legitimate computer processes for illegitimate purposes. Crimes in this category include fraudulent use of automated teller machine (ATM) cards and accounts; theft of money from accrual, conversion, or transfer accounts; credit card fraud; fraud from computer transactions (stock transfers, sales, or billings); and telecommunications fraud. Crimes in which the computer is the target include such offenses as theft of intellectual property, theft of marketing information (e.g., customer lists, pricing data, or marketing plans), or blackmail based on information gained from computerized files (e.g., medical information, personal history, or sexual preference)...
Words: 803 - Pages: 4
...Professor Gregorio Chavarria CIS Information Technology and Crime 15 January 2012 Defining computer crime effectively is a daunting and difficult task. Nevertheless there are four general categories of criminal crime, including (1) the computer as an instrument of crime, (2) the computer as a target, (3) the computer as incidental to crime, and (4) crimes associated with the prevalence of computers. (Taylor, & Fritsch, 2011) The first category, the computer as an instrument of crime is basically using the computer to facilitate the crime. The criminal introduces a program to manipulate the computer's analytical processes, thereby facilitating the crime. The computer is used to connect to networks so the criminal can do such crimes as fraud, theft of service, theft, threats and even harassment. Another method involves converting legitimate computer processes for illegitimate purposes. Crimes in this category include fraudulent use of automated teller machine (ATM) cards and accounts; theft of money from accrual, conversion, or transfer accounts; credit card fraud; fraud from computer transactions (stock transfers, sales, or billings); and telecommunications fraud. Crimes in which the computer is the target include such offenses as theft of intellectual property, theft of marketing information (e.g., customer lists, pricing data, or marketing plans), or blackmail based on information gained from computerized files (e.g., medical information, personal history, or sexual preference)...
Words: 803 - Pages: 4
...com/criminal-law/criminal- terms. Jane committed this crime when she agreed to accept the five hundred dollars, in exchange for the key. Thinking that Jack was going to commit some sort of crime or / “steal some of her valuables”. For this reason I do think that the woman should be convicted easily of this crime. although the mitigating factor I found should help her during the sentencing phase, and my even provide an adequate defense. Identity Theft: is the crime of obtaining the personal identifying information of another person and using that information to obtain property or information to which he is not entitled, and doing so without the permission of the person whose personal identifying information is used. This is a very rapidly growing area of white collar crime, is international in scope, and is often done with sophisticated computer hacking techniques, but can also be accomplished by simply surfing trash cans. Shredders are good protection against identity theft. Penalties vary from state to state, but many identity theft offenses are felonies which carry state prison http://criminal-law.freeadvice.com/criminal-law/white_collar_crimes/identity_theft.htm Forgery: A person commits the crime of forgery when, with the intent to defraud, s/he executes, alters or publishes a writing without the owner's knowledge or consent. A...
Words: 1097 - Pages: 5
...commit or engage in larceny or other similar crimes. When considering the relationship between the crime and the consequences, some still choose the crime. This result has been considered a variable of the environment in which a person is exposed to. Also while evaluating this information a conclusion was drawn that sometimes it is more profitable for a criminal to steal than to work. NICOLETA-ELENA BUZATUI, METHODOLOGICAL PARTICULARITIES IN INVESTIGATING HOME LARCENY A description in the second sentence of this journal article describes larceny as: In agreement with article 208 of the Penal Code1, theft - in its simple form - is considered to be any movable goods seized from somebody’s property without the consent of the respective person but simply taken into the unjustified possession of the thief. Any energy having an economic value is also considered to be movable goods, as for example documents. The deed is considered to be a theft even if the goods partially or totally belong to the doer and, the moment the theft was committed, it was in the legal possession of another person. The articles cover the breakdown of how the crime of larceny is investigated and each aspect of collecting information or evidence of the crime itself. It details from the moment of entry to prosecution of the crime. William T. Harbaugh...
Words: 645 - Pages: 3
...Curbing Bike Theft in Eugene Bike theft is an important issue in Eugene, especially for college students on and around campus. I recommend taking multiple steps to offer education on how to correctly use bike locks as well as enforce and increase the penalties for thieves. I’ve outlined how to educate students on theft prevention, how to register bikes, and how increased penalties will help reduce crime below. Education on Bike Locks Many bikes that are stolen are not properly locked up. The University should provide education on which locks to use and how to properly use them. With less bike theft due to prevention tactics, fewer bikes reported stolen might be offered more time and energy to locate by local police. Bikes left overnight or in dark, secluded places are more subject to theft. Educating students on the ways theft occurs prevents easy theft, which could turn off a large number people from stealing bikes. Information that is useful to students: * Use a metal “U” shaped lock * Verify that the “U” lock is properly inserted through the frame and tire * Put bikes in safe places at night * Register all bikes Having a representative on University campus to explain how important bike lock safety is can significantly decrease theft. Registration Bicycle registration is a viable way to prove ownership of a bike. Making registration for bicycles easier and more convenient creates situations where it is more difficult to resell a stolen bike...
Words: 487 - Pages: 2