File type-ppt on cybercrime

Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.

CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks for Preventing Identity Theft  Learn Ways to Recover from Identity Theft  Review Cautions In the last five years, online crime – cyber crime – has increased significantly. Last year estimated annual losses from all types/ accounts  Dispute fraudulent charges  Communicate via certified letter  Save all correspondance  File a complaint with the Federal Trade Commission (FTC). ◦ Will help to prevent someone /


Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.

crimes -Sale of illegal articles -Online gambling -Forgery http://www.slideshare.net/rohithasankar/cyber-crime-17280637 Types of Offenses that distinguishes Cybercrime from other Online Violations: 1.offences against the confidentiality, integrity and availability of computer data and /as fraud or illegal gambling). 3.The computer as an accessory - using a computer as a "fancy filing cabinet" to store illegal or stolen information. cybercitizenship.org How To Prevent Cyber Crime: 1.Education and Training/


1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.

Protecting physical assets (skip) Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 2 Types of Cybercrime Virus creation deployment Fraud-related (58 percent of cybercrime) – –Auction fraud – –Nondelivery of ordered items – –Credit and debit card fraud /- not required Polymorphic viruses – –Periodically rewrite themselves to avoid detection Multipartite viruses – –Infect multiple file types Stealth viruses – –Erase their code from the hard drive and reside in the active memory Copyright ©/


Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.

E. Salane Center for Cybercrime Studies John Jay College/Attorney Generals  Breach notification letters  Civil and criminal prosecutions  Company press releases and announcements  SEC Filings Organizations that track breaches  Open Security Foundation: DataLoss DB project http://datalossdb.org/http://datalossdb.org/ / http://www.ftc.gov Breach Incidents 2000-2009 Incidents By Breach Type Incidents Business Incidents by Data Type Notable large scale breaches in the Data Aggregation Industry  What is the /


Forensics Book 4: Investigating Network Intrusions and Cybercrime Chapter 2: Investigating Network Traffic.

Cybercrime Chapter 2: Investigating Network Traffic Copyright © by EC-Council Press All rights reserved. Reproduction is strictly prohibited Objectives  Understand network protocols  Understand the physical and data link layers of the OSI model  Understand the network and transport layers of the OSI model  Describe types/include:  Detects threats based on pattern matching  Uses syslog, SMB messages, or a file to alert an administrator  Develops new rules quickly once the pattern (attack signature) is /


Network and Internet Security Chapter 9. 2 Why Be Concerned about Network and Internet Security?  Crime: Illegal activity  Computer crime (cybercrime):

9 2 Why Be Concerned about Network and Internet Security?  Crime: Illegal activity  Computer crime (cybercrime):  Any illegal act involving a computer, including:  Theft of financial assets  Manipulating data for / Used by botherders to send spam, launch Internet attacks and malware, etc.  Malware: Any type of malicious software  Written to perform destructive acts (damaging programs, deleting files, erasing drives, etc.)  Writing malware is considered unethical, distributing is illegal  Can infect /


1. 1.To discuss the history of computer virus outbreaks. 2.To examine the difference between computer worms and viruses. 3.To discover the various types.

or music CD or thumb drive 6 Is an independent program –it does not attach itself to files or programs Is classified by two types: –a network worm –a host worm 7 Computer Worm: an independent program which multiplies itself /.com/virus-scan- help/answers/the-history-of-computer-viruses.shtml Worms. (2007). Retrieved October 9, 2008, from Cybercrime: http://cybercrime.planetindia.net/worms.htm 45 46 Project Coordinator: Maggie Bigham Production Manager: Dusty Moore Executive Producers: Gordon Davis, Ph./


Forensics Book 4: Investigating Network Intrusions and Cybercrime Chapter 5: Investigating DoS Attacks.

Intrusions and Cybercrime Chapter 5: Investigating DoS Attacks Copyright © by EC-Council Press All rights reserved. Reproduction is strictly prohibited Objectives  Understand DoS attacks  Recognize the indications of a DoS/DDoS attack  Understand the different types of DoS attacks/it  In OOB attacks, a virus file has an URGENT flag with no data Copyright © by EC-Council Press All rights reserved. Reproduction is strictly prohibited Buffer Overflow Attack  Type of attack that sends excessive data to/


Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.

Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS Objectives Highlight role of a Security Breach/ Digital Evidence The shift from creating documents on physical paper to computer files has lead to new types of investigations being undertaken on digital equipment The shift from creating documents on physical paper to computer files has lead to new types of investigations being undertaken on digital equipment Digital evidence can be defined as/


1. 1.To discuss the history of computer virus outbreaks. 2.To examine the difference between computer worms and viruses. 3.To discover the various types.

or music CD or thumb drive 8 Is an independent program –it does not attach itself to files or programs Is classified by two types: –a network worm –a host worm 9 Computer Worm: an independent program which multiplies itself /.com/virus-scan- help/answers/the-history-of-computer-viruses.shtml Worms. (2007). Retrieved October 9, 2008, from Cybercrime: http://cybercrime.planetindia.net/worms.htm 63 64 Project Coordinator: Maggie Bigham Production Manager: Dusty Moore Executive Producers: Gordon Davis, Ph./


Why Be Concerned About Network and Internet Security? Computer Crime (cybercrime) – Any illegal act involving a computer, including: Theft of financial.

Why Be Concerned About Network and Internet Security? Computer Crime (cybercrime) – Any illegal act involving a computer, including: Theft of financial assets /steal identifying information Understanding Computers in a Changing Society, 5th Edition 26 Computer Sabotage Computer Viruses and Other Types of Malware – Malware Any type of malicious software Written to damage programs, delete files, erase drives, etc. – Logic bomb – malware program that activates when certain condition is met (particular/


Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.

Week 5 IBS 520 Computer and Online Security Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving a computer Event or /infection? Boot sector virus Resides in boot sector of floppy disk or master boot record of hard disk What are the three main types of virus? File virus Attaches itself to program files Macro virus When you open document that contains infected macro, virus loads into memory How do viruses activate? Logic bomb Virus that /


IETE Apex Forum on Cybercrime and Indian Cyberlaw- An introspection 12 September,2008, IETE HQ. D omain names & Dispute Resolution Karnika Seth Cyberlaw.

IETE Apex Forum on Cybercrime and Indian Cyberlaw-/of infringing labels and marks for destruction or erasure.  Injunction may be of the following types:- Anton Piller Order Mareva Injunction Interlocutory Injunction Perpetual injunction. Kind of InfringementRelief Copyrighted by Seth / UDRP proceeding with an approved dispute resolution service provider. A victim of cybersquatting may also file an InterNIC Registrar Problem Report regarding a cybersquatter posing as a registrar.UDRP proceeding with an/


Session 236 Cybercrime, Incident Response & Digital Forensics Services.

Session 236 Cybercrime, Incident Response & Digital/ Incident Response process Declaring an incident Investigating High Tech crimes Evidence and the legal system Demonstration 5 Types of Incidents Denial of service System compromise: –Local/remote –Root/admin/user –Vulnerability –Configuration –/ attacks are likely unobserved Attackers hide themselves using a variety of techniques –Log editing –File and directory hiding –Process hiding –Network usage hiding— covert channels 8 Defenses from Covering the/


1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Copyright & the Internet CJ341 – Cyberlaw & Cybercrime.

R. Stephenson. All rights reserved. Copyright & the Internet CJ341 – Cyberlaw & Cybercrime Lecture #14 M. E. Kabay, PhD, CISSP-ISSMP D. J. / permission – copyright violations  Lawsuits against companies & individuals  Gnutella, Wrapster extending trades to other files  Problems  Bandwidth saturation – many colleges  Legal liability if problem ignored  RIAA (Recording /to prevent data extraction (e.g., PDF with security)?  Would typing out quotations be violation of DMCA?  Invasions of privacy?  /


1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Trademarks & Domain Names CJ341 – Cyberlaw & Cybercrime.

. R. Stephenson. All rights reserved. Trademarks & Domain Names CJ341 – Cyberlaw & Cybercrime Lecture #15 M. E. Kabay, PhD, CISSP-ISSMP D. J. Blythe,/. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Definition and Types of Marks  Trademark  Word, name, symbol, device or combination  Used to distinguish/Property (1883)  National treatment – same rules for all  Rights of priority for filing of registration  Similar rights of refusal of registration  Seizure of contraband / counterfeits /


Forensics Book 4: Investigating Network Intrusions and Cybercrime Chapter 4: Router Forensics.

and Cybercrime Chapter 4: Router Forensics Copyright © by EC-Council Press All rights reserved. Reproduction is strictly prohibited Objectives  Understand router architecture  Understand the use of Routing Information Protocol (RIP)  List the different types of/the course of a normal investigation  Items considered volatile evidence: Current Configuration, Access list, Time, and Log files  Methods to collect volatile evidence:  Direct access – carried out using show commands  Indirect access – /


TOPIC FIVE Introduction to Information Security, IT Crimes and Cybercrimes 1.

crimes  Much will depend on what a particular scholar has intended to say 10 Types of Cyber crimes  According to Mumbai Police department; Hacking Phishing Denial of service attack/another problem. 49 Continue Other Jurisdiction The Council of Europe’s Convention on Cybercrime ◦ In the absence of a more International instrument to regulate and criminalize cyber/ server was damaged after it had attempted to reboot 256 times and the file loadtrm.exe had been altered, both as a result of interference with the/


Chapter 8 Cybercrime, Cyberterrorism, and Cyberwarfare.

Chapter 8 Cybercrime, Cyberterrorism, and Cyberwarfare Cybercrime Illegal or unethical activities performed in cyberspace Copyright © 2003, Addison-Wesley Hacker Originally, an expert programmer Today, someone who breaks into computers Types of hackers White-hat / 2003, Addison-Wesley Figure 8.4 Passwords are stored in encoded form. Minimize risk if hacker steals password file Un-encoded password needed Password cracking programs Dictionary based Avoid English words Copyright © 2003, Addison-Wesley Rules for/


By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.

Cybercrime Computer crime or cybercrime is a form of crime where the Internet or computers are used as a medium to commit crime.Internetcomputers Type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. hackingcopyright infringementchild pornographychild grooming There are two types/scam victims and find who scammed them. Breaking passwords and decrypting files to find out what suspected hackers are doing The US Immigration/


Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.

Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1 Hackers Anyone who unlawfully /Prentice-Hall, Inc. 7 What Viruses Do Replicate themselves: –Slow down networks Secondary objectives: –Display annoying messages –Delete files on the hard drive –Change computer settings © 2009 Prentice-Hall, Inc. 8 Types of Viruses Boot-sector viruses –Replicate themselves in the boot sector of the hard drive Logic bombs –Activate when certain /


The Elusive Enemy - Cybercrime

bots that report to aggregator systems on web servers, which allows easy searching for files across multiple infected PCs. iFrames – distribution technology for sale to simplify malware /educate their employees who interface with clients should be made aware of these types of threats to help triage potential victims. Screen is login page to banking/countries that shield them from civil actions Makes it easy to enter the cybercrime market Not criminally illegal. Nuclear Winter Crew boasts a long list of /


CLICKTECHSOLUTION.COM.  INTRODUCTION  HISTORY OF CYBER CRIME  CATEGORIES OF CYBER CRIME  TYEPS OF CYBER CRIME  CYBERCRIMES THREATENS NATIONAL SECORITY.

crime e.g. cyber terrorism, credit card fraud and pornography etc. CLICKTECHSOLUTION.COM TYPES OF CYBER CRIME CLICKTECHSOLUTION.COM  HACKING :- Hacking in simple terms means an/ them is called cyber vandalism. These are program that attach themselves to a file and then circulate. CLICKTECHSOLUTION.COM  CYBER TERRORISM : Terrorist attacks on the / that are addressed by the Information Technology Act, 2000. CLICKTECHSOLUTION.COM Cybercrime is indeed getting the recognition it deserves. However, it is not /


Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.

of the Receiving Country Receive a full briefing on role of the Cybercrime Unit Receive a full briefing on existing domestic cadastres and databases Practical / software Provide the software and licence free of charge Course Content How file sharing works – scoping the problem How to trace by IP address /Investigators Course Content Explanation of How a Computer Functions & Operating Systems Description of Network Types How The WWW, Search Engines & Social Networking Sites Operate Tracing Emails Internet For/


IT GOVERNANCE AND CYBERCRIME Open Source Forensic Tools 19/04/10.

IT GOVERNANCE AND CYBERCRIME Open Source Forensic Tools 19/04/10 Agenda  What is Open Source  Features Open Source  Relevance to Digital Forensics  Windows Based  / Auto generation of MBR (if not present) http://liveview.sourceforge.net/ Screenshots of LiveView Choose boot type – image or physical drive Booting operating system in virtual environment TestDisk 6.11  Open source  Recovery of files and partitions  Command line Interface Screenshots of TestDisk 6.11 TestDisk can create logs and work off/


Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.

using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where the computer used as an object or subject of crime The first recorded cyber /85% “ If you experienced computer system intrusions by someone from outside your organization, indicate the type of activity performed by the intruder.” Manipulate data integrity 6.8% Installed a sniffer 6.6% Stole password files 5.6% Proving/scanning systems 14.6% Trojan logons 5.8% IP spoofing 4.8/


The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. The Elusive Enemy - Cybercrime Duane Barraugh SecureWorks.

, Inc. All rights reserved. The Elusive Enemy - Cybercrime Duane Barraugh SecureWorks The Information Security Experts Copyright © 2008/ user’s directory Added to registry to run on startup Installed system drivers to hide file and registry key Downloads drop box IP address 7 User login data posted to hacker/ intelligence artifacts processed a day 2,300 clients attacked / day 1,500 attack types / day ~3,000,000 IP addresses of attackers detected / year The Information Security Experts Copyright © 2008 SecureWorks/


Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

(Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International/ disorders found in spies, the two most common are antisocial personality disorder and narcissism Types of Malicious Incidents "IT sabotage Typically committed by system administrators, programmers, technically sophisticated users/to-Know Access Monitoring of Insider Email Monitoring of Insider Keystrokes Examination of Insider Computer Files Limit the Use of 3 rd Party Apps ob Phones / Computers Monitoring Insider Internet /


The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.

www.usdoj.gov http://www.usdoj.gov /criminal/cybercrime/PatriotAct.htm http://www.usdoj.gov US Department/ — and similar features, an e-mail may include one or more "attachments" consisting of any type of data, including voice recordings. As a result, a law enforcement officer seeking to obtain a suspect/ pen/trap orders issued by federal courts now have nationwide effect (3) law enforcement authorities must file a special report with the court whenever they use a pen/trap order to install their own /


Cyber Crimes. Introduction Definition Types Classification.

crime Definition: Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission Cyber Crimes Types Hacking Theft Cyber Stalking Identity Theft Malicious Software Child soliciting and Abuse Types Hacking: i. Type of crime / applications as well as malware loaded on the users mobile device. Cyber crimes in mobile environment: Stealing personal data like files, contacts, photos and other private details. Charging a ‘fee’ for use, update or installation of a legitimate and/


Forensics Book 4: Investigating Network Intrusions and Cybercrime

Forensics Book 4: Investigating Network Intrusions and Cybercrime Chapter 3: Investigating Web Attacks Objectives Recognize the indications of a Web attack Understand the different types of Web attacks Understand and use Web logs / sites Unusually slow network performance Frequent rebooting of the server Anomalies in log files Error messages such as 500 errors, “internal server error,” and “problem processing your request” Types of Web Attacks Attacks include: Cross-site scripting (XSS) attack Cross-site/


LESSON 2: Internet, Computer Ethics and Security OBJECTIVES  Review the basics Internet Concepts and its types  Determine the computer ethics and netiquette.

IIs a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide some kind of useful information. TYPES OF WEBSITE  Portal website /observe when using computers.  Software Piracy  Computer Viruses/Worms  Plagiarism  Hacking  File privacy  Intellectual Property Rights  Copyright  Information Privacy COMPUTER SECURITY RISKS -T-This is /THE REPUBLIC ACT 10175: ANTI- CYBERCRIME LAW - The purpose of this act define, provide for the prevention, /


Cybercrime A Global Overview of the Role of Internet Service Providers in assisting Law Enforcement and Public Safety efforts.

Cybercrime A Global / world and have been accelerated and magnified……basically the GLOBALIZATION OF CRIME over the Internet has occurred. Major Types of Cyber criminal activity in Africa Cyber Fraud, particularly targeting consumer banking, hijacked business funds transfers and ‘/ deconfliction, both domestically and internationally. ISP’s globally are the business record holders, the log file holders and technical subject matter experts often in the best position to assist law enforcement efforts. Contact/


Computer Crimes  Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played.

cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime. Netcrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type/ computer systems on a network without the knowledge of the system users. Viruses spread to other computers through network file system, through the network, Internet or by the means of removable devices like USB drives and CDs. Computer /


Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.

Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary information (whether a simple user ID and / in as her own work A student makes a copy of a software program borrowed from another student to use on his computer at home. A student downloads a graphic file from the web to place on his own webpage. However, he does provide a link to the author’s site. A student uses another student’s project website as/


ECEN5553 Telecom Systems Dr. George Scheets Week 6 Readings: [11a] "Cybercrime: Dissecting the State of Underground Enterprise" [11b] "A Call to Cyber.

Systems Dr. George Scheets Week 6 Readings: [11a] "Cybercrime: Dissecting the State of Underground Enterprise" [11b] "A/ Information Available n n No QoS guarantees or Guaranteed Bandwidth May have trouble rapidly moving large files May have trouble reliably moving time sensitive traffic WARNING: SECURITY HAZARD! 802.3 Ethernet Packet /? n Configuration u Every site connect locally? u All sites connect thru, say, OKC? n Type of connection u Leased Line u DSL? u Cable Modem? u Other? OKC Detroit NYC Carrier /


Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property,

Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber /permits e-mail marketers to send unsolicited commercial e-mail as long as it adheres to 3 basic types of compliance 1. Unsubscribe compliance (Visible Opt-out) 2. Content compliance – label if adult /Matching Using customer information gained from many sources to market additional business services  Unauthorized Personal Files Collecting telephone numbers, e-mail addresses, credit card numbers, and other personal information to build/


Computer Security & Safety

or by deliberately altering or damaging data. Discovering Computers 2014: Chapter 5 Cybercrime is one of the FBI’s top three priorities Perpetrators Hacker Cracker /worm Trojan Horse Rootkit Every unprotected computer is susceptible to this first type of security risk Virus Potentially damaging computer program that affect, or infects/installed, the author can execute program, change setting, monitor activity, and access files. Although rootkits can have legitimate uses, such as law enforcement, their use for/


COMPUTER CRIME.

individuals/organizations during the course of their occupations. Computer crime or CyberCrime is criminal activity that involves unlawful access to, or utilization of,/of the transaction uses symmetric encryption in the form of DES. File encryption- File encryption--digital certification that certain users have legitimate access to encryption / of the target population data. Identifying computer criminals To prevent given types of crimes, criminologist often look for common character traits that can/


Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.

 Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers  Conclusion  Crime => Illegal activities  Cyber => Characteristic of the culture of computers… Computer crime, or cybercrime, refers to any crime that involves a /Protect your Computers Conclusion User awareness is key to a secure computer/network Do not open suspicious files/emails Verify ActiveX/Java prompts Avoid using P2P programs Avoid downloading freeware If attacked, disconnect the /


PowerPoint Presentation to Accompany Chapter 10 Security & Privacy Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice.

Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Objectives 1.Discuss various types of cybercrime. 2.Differentiate between different types of malware. 3.Explain how to secure a computer. 4.Discuss safe computing practices. /uses heuristic methods.  Monitoring your machine for suspicious activity, to catch new viruses that are not in the definition files.  Some very good free programs include AVG Free, Avast, and Microsoft Security Essentials.  Many ISPs provide /


2013 NORTON REPORT. 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND,

SECURITY SOLUTIONS FOR MOBILE DEVICES EXIST * NEARLY 1/2 DON’T USE BASIC PRECAUTIONS SUCH AS PASSWORDS, SECURITY SOFTWARE OR BACK UP FILES FOR THEIR MOBILE DEVICE * *AMONG MOBILE DEVICE USERS CONSUMERS’ SECURITY IQ – HIGH ON PC, LOW ON MOBILE 72 % 90 /have an infected computer I experienced another type of cybercrime on my cell / mobile phone / tablet device I experienced another type of cybercrime on my desktop or laptop computer DEFINITION OF CYBERCRIME Cybercrime and /or negative online experience is /


Computers Are Your Future

-up and banner ads Keyloggers—record keystrokes to provide cybercriminals with confidential data * Computer Crime and Cybercrime * 07/16/96 Types of computer crime (con’t.) Computer virus—code concealed inside a program that can harm or destroy files Many spread through e-mail attachments File infectors—attach themselves to files Payload—refers to the dangerous actions a virus performs. Macro viruses—attach to data/


Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Tenth Edition Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.

Pearson Education, Inc. Publishing as Prentice Hall 10 Computer Viruses Computer virus: A program that attaches itself to another computer program Attempts to spread to other computers when files are exchanged One of the most widespread types of cybercrimes Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 11 Computer Viruses (cont.) Main purpose –Replicate themselves and copy code to as many other/


PowerPoint Presentation to Accompany Chapter 10 Security & Privacy Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice.

2014 Pearson Education, Inc. Publishing as Prentice Hall Objectives 1.Discuss various types of cybercrime. 2.Differentiate between different types of malware. 3.Explain how to secure a computer. 4.Discuss safe /Text spam Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Spam in Gmail Account Cookies  Small text files  Help websites identify you when you return  Useful, yet could collect information Visualizing TechnologyCopyright © 2014 Pearson Education, Inc./


Information Technology INT1001

provide cybercriminals with confidential data Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall * Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Types of computer crime (continued) Computer virus: code that is concealed inside a program and intended to harm or destroy files File infectors attach themselves to files. Boot sector viruses attach to the first tracks on a hard drive and execute each time/


Computers Are Your Future Tenth Edition

provide cybercriminals with confidential data Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall * Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Types of computer crime (continued) Computer virus: code that is concealed inside a program and intended to harm or destroy files File infectors attach themselves to files. Boot sector viruses attach to the first tracks on a hard drive and execute each time/


Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.

to enable identity theft Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 23 Computer Crime and Cybercrime Types of computer crime (cont.) o Malware (short for malicious software)—programs that intentionally harm a computer system or/ 25 Computer Crime and Cybercrime Types of computer crime (con’t.) o Computer virus—code concealed inside a program that can harm or destroy files Many spread through e-mail attachments File infectors—attach themselves to files Payload—refers to the dangerous/


Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.

to enable identity theft Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 31 Computer Crime and Cybercrime Types of computer crime (cont.) o Malware (short for malicious software)—programs that intentionally harm a computer system or/ 33 Computer Crime and Cybercrime Types of computer crime (con’t.) o Computer virus—code concealed inside a program that can harm or destroy files Many spread through e-mail attachments File infectors—attach themselves to files Payload—refers to the dangerous/


Foundations of digital Forensics

applies throughout the territorial Two of the U.S. Constitution’s provisions are particularly relevant to the conduct of cybercrime investigations. The Fourth Amendment & Fifth Amendment 4. Fourth Amendment The Fourth Amendment creates a right to be free/owner of the files committed the key to memory, then he/she can claim the Fifth Amendment privilege and refuse that fraud. Conducting Digital Investigation Digital investigations inevitably vary depending on technical factors such as the type of computing /


Ads by Google