Cybercrime Investigations & Computer Crime Prevention

I. CYBERTHREATS

A. Crimes, Case Studies and Threats




B. Insider Threats to Business Data and Information

    What motivates employees to commit computer crimes and how are the crimes committed?

    In Avoiding Cyberfraud in Small Businesses, Bologna and Shaw (pp. 13-16) describe  the ways in
    which employee computer frauds occur. An employee may bypass or override computer system
    controls. The employee may counterfeit, manipulate or destroy data in computer-kept accounts
    receivable or accounts payable records. A employee may enlist other employees or associates to
    assist with theft or fraud. Malevolent employees may introduce viruses, worms, Trojan horses or other
    problematic computer programs in order to disrupt a business for financial gain. Embezzlers often have
    insider operational knowledge about how a business works and technical knowledge about the
    computer systems associated with a business. Offenders often exploit weaknesses in computer and
    accounting systems for personal financial gain.

    Reference:
    Bologna, J. and Shaw, P. (2000). Avoiding cyberfraud In small businesses. John Wiley and Sons. N.Y.

---------------------------------------------------------------------------------------

C. Motives

    Here is a list of the ways in which malevolent employees or others can cause problems for those who
    do not protect computer data.

    Deliberate Malfeasance
    Internet Protocol Number Misuse
    Customer Data Theft
    Fraud
    Sabotage
    Hacking

    Lost Productivity
    Chatting or Web Mall
    Auctions, Shopping
    Job Hunting
    Day Trading
    Gambling
    Pornography

    Employee Morale
    Internal Protest
    Spread Discontent
    Organize Labor
    Expose Problems / Whistle Blowing
    Press Leaks

    Privilege Abuse
    Snooping
    Hacking
    Insider Trading

    Hostile Work Environment
    Hazing
    Discrimination
    Racial Slurs
    Hate Sites
    Terrorism

    Erroneous Disclosure of Information
    Ignorance
    Negligence
    Process Failure
    Technical Failure
    Semi-Deliberate






Notes:

(1) Thanks to Ashley of Ms. Massengills class for this contribution.

Cyberthreats

Investigations

Prevention

Contact:

Dr. Frank Kardasz  
P.O. Box 45048
Phoenix AZ 85064

e-mail:  kardasz(at)kardasz.org
Blog:
http://kardasz.blogspot.com/
Linkedin: http://www.linkedin.com/in/kardasz
Facebook: http://www.facebook.com/Dr.Kardasz