Escolar Documentos
Profissional Documentos
Cultura Documentos
Collegiate
Case
Study www.usatodaycollege.com
Security experts say Rock • Content related crime - child pornography and criminal copyright infringement.
• Traditional crimes committed by means of a computer - fraud and theft.
Phish widening net • Attacks on computers and computer systems – hacking, pharming and phishing.
By Jon Swartz
.....................................................................................4 Those engaging in illegal activities online often have unlimited resources, time,
and in most cases motivation, requiring businesses and government agencies to
invest significant time and resources to upgrade their security programs to battle
NATO to study defense the hacker. As soon as a new protocol is developed and announced, it seems that
against cyberattacks hackers have it figured out, and a more elaborate design must be developed. A
By Jim Michaels 2006 FBI estimate pegged the total cost of cyber crime to businesses above $67
billion. This case study will explore the different ways that cyber crime might
.....................................................................................5
impact students personally, as well as raise awareness of the broader implications
Infamous spammer arrested, for our economy and national security.
faces new charges
By Byron Acohido
.....................................................................................6
Chinese hackers seek U.S. access
Attacks highlight weaknesses in U.S. security
Critical inquiry
By Jon Swartz Forensic analysis indicates the hack-
Discussion and future implications
USA TODAY ers may have sought information on
.....................................................................................7 war games in development at the
SAN FRANCISCO — The cyberattack naval college, he said. The college
Additional resources/Voices of a U.S. military computer system was vulnerable because it did not
Further exploration and Voices extension has deepened concern about cyber- have the latest security protections,
spying and the security of the Gabos said.
....................................................................................8
Internet's infrastructure.
The November attack was part of an
Chinese hackers were most likely ongoing campaign by Chinese hack-
behind an intrusion in November ers to penetrate government com-
that disabled the Naval War College's puters. The attacks often come in the
network, forcing it to disconnect form of "spear phishing," scams
from the Internet for several weeks, where attackers craft e-mail mes-
says Lt. Cmdr. Doug Gabos, a sages that seem to originate from the
spokesman for the Navy Cyber recipient's organization in a ploy to
Defense Operations Command in gain unauthorized access to confi-
Norfolk, Va. dential data.
© Copyright 2008 USA TODAY, a division of Gannett Co., Inc. All rights reserved.
AS SEEN IN USA TODAY’S MONEY SECTI ON, MARCH 12, 2007, 3B
by Sam Ward, USA TODAY The Estonia attacks were "sustained" and "coordinated,"
By Jim Michaels Appathurai said.
USA TODAY
Estonia bills itself as one of the most advanced nations
BRUSSELS — NATO defense ministers are considering when it comes to online services. Estonians can vote
extending the alliance's protection into cyberspace in online, and a large percentage of people there use the
the wake of a devastating digital attack that nearly crip- Internet for banking and other services.
pled member nation Estonia.
NATO dispatched a team of specialists to Estonia after
Defense ministers agreed "urgent work is needed to the attacks, but it has limited capacity to support broad-
enhance the ability to protect information systems of er cyberspace defense efforts.
critical importance," NATO spokesman James Appathurai
said Thursday. NATO's capabilities are directed toward protecting the
alliance's own network, said Sheena Carrigan, a NATO
NATO will begin examining how it may protect its 26 spokeswoman. Expanding that mission would be up to
member states from electronic attacks like the one in the alliance's political leadership, she said.
Estonia, Appathurai said during a meeting of the minis-
ters.
2. Another way to define cyber crime is simply as criminal activity involving the information technology infra-
structure. The acts themselves manifest themselves in many different ways. Define and provide examples of
the following types of cyber crime along with suggestions for solutions in combating this type of crime:
3. Under what conditions is a company legally obligated to report a computer-related security incident to the
authorities? When should individual users report suspicious computer activity to law-enforcement? Which
agencies are set up to receive such complaints?
Future Implications
1. In what ways might the growth of cyber crime shape how the Internet develops in the future?
2. The potentially global nature of cyber crime makes clear the need for global solutions. How might the U.S. reach
consensus with other countries that may have very different legal traditions and no basis for substantive coopera-
tion? What implications are there if such cooperation and consensus can’t be achieved?
3. What steps can we, as individuals, take to protect ourselves from the impact of cyber crime in the future?
Beyond identity theft, what other types of criminal behavior are most likely to affect the average citizen?
4. According to the National Cyber Security Alliance, online malfeasance and criminal activity can be divided into
Cyber Ethics, Cyber Security and/or Cyber Safety. Given the explosion of new technologies such as wireless and
GPS, discuss the potential for exploitation in these three areas.
Additional Resources