14 Cybercrime.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Network and Internet Security and Privacy.  Explain network and Internet security concerns  Identify online threats.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Security, Privacy, and Ethics Online Computer Crimes.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Threats and Attacks Principles of Information Security, 2nd Edition
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Chapter 11 Security and Privacy: Computers and the Internet.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Risks and Revenues Virtual Business Copyright © Texas Education Agency, All rights reserved.
Cyber Crimes.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
CYBER CRIME.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Crime & Malpractice AS Module Heathcote Ch. 10.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Computer Security Management: Assessment and Forensics Session 8.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
INTRODUCTION & QUESTIONS.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
Cybersecurity Test Review Introduction to Digital Technology.
MIS323 – Business Telecommunications Chapter 10 Security.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
IT Security  .
Chapter 11 crime and security in the networked economy
Cybersecurity Awareness
Faculty of Science IT Department By Raz Dara MA.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer Security By: Muhammed Anwar.
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

14 Cybercrime

Introduction Early mainframe computers were stand-alone systems and were not interconnected. Security threats were limited to disgruntled or dishonest employees. continued on next slide

Introduction In 1981, IBM released personal computers. In the 1990s, the World Wide Web inter-connected these computers. Cybercrime involves either the computer as the target or as the means to commit the crime.

Internal Threats Internal threats come from employees and contractor's employees who have direct access to the employer's computer system. Dishonest employees are motivated by personal gain. Logic bomb is a program within a program that is destructive and acts based on a trigger event. continued on next slide

Internal Threats Exiting employees are those leaving their current employment voluntarily. Loyalty is shifting. Exit interview should be conducted to determine why the employee is leaving. Been known to take trade secrets and customer lists continued on next slide

Internal Threats Disgruntled employee is one who is motivated by striking back at their employer as the result of some real or imagined wrong. Motivation to get even

External Threats Hackers are intruders who enter into another's computer system without authorization. White Hat Hackers are motivated to test their skill against those who design a computer systems security features. continued on next slide

External Threats Black Hat Hackers are cyber-criminals and their motivation is to circumvent a computer security for personal gain or vandalism. continued on next slide

External Threats Viruses are malicious code that replicates itself and inserts copies in other programs. Worms are like viruses but spread with no human interaction after they are started. continued on next slide

External Threats Bot-nets are malware programs that allow remote users to control the computer. Economic espionage occurs when someone takes information for the benefit of someone other than the owner.

Fraud Internet allows for committing basic and complex frauds. FBI and BJA established the Internet Fraud Complaint Center. They receive a quarter million complaints a year, and an annual loss in excess of a half a billion dollars is reported.

Fraud Types Auto fraud FBI impersonation Seller keeps the money for the vehicle and never delivers the car. FBI impersonation Bogus inheritance, lottery winnings, and extortion continued on next slide

Fraud Types Scareware/Ransomware involves a pop-up message on the computer indicated that it has been infected with a virus, and the victim sends money to pay for a software to fix the problem. continued on next slide

Fraud Types Real estate/timeshare involves the victim sending money for a house or vacation and the place doesn't exist or information is used from the application to steal the identity. Romance scams involve the victim believing they are in a real relationship and the perpetrator faking the relationship to obtain money.

Identity Theft Identity theft involves the steal of a person's identity to obtain credit and buy merchandise without the intention of paying. Phishing involves the victim getting an email from a bank requesting verification and the victim providing the offender with personal information.

Child Pornography The first Amendment's protections of free speech do not apply to child pornography. Child pornography market increased dramatically with the advent of the Internet. Estimated over one million pornographic images of children on the Internet continued on next slide

Child Pornography Child pornography comes to the attention of investigators by: Informants Computer technicians Search incident to an arrest Chat rooms

Child Molesters Child molesters are constantly in search of new victims. Victims are primarily found via the Internet. Offender are adept at manipulation. Investigators pose as children in these chat rooms. Suspects can be arrested for arriving at a meeting place to meet the "child".

Contraband Sales Contraband is illegal goods and the Internet has spurred the sales of such items. Deep Web allowed users to access the Internet without divulging their identities. continued on next slide

Contraband Sales Onion Routing is what the system is called because of the many layers of encryption. Bitcoins is a form of unregulated Internet currency.

Terrorism Our critical national infrastructure is dependant on computer networks. This makes them targets for terrorism. To date, cyber terrorism has not happened in the United States. continued on next slide

Terrorism Cyber terrorism is inexpensive, less personal risk, wide variety of targets to chose, requires less training, and has potential to affect a large number of people. Hacktivism is not cyber terrorism. It is politically motivated and wants to protest and disrupt Internet functions.

Investigation Forensic examination is needed in cybercrime. Seizure of the electronics is the first step. Searches of electronics can be obtained through consent or a warrant. continued on next slide

Investigation Two methods to determine passwords Blunt force attack involves the use of software that systematically enters every combination of letters, characters, and numbers until the password is discovered. Success depends on the level of the password. continued on next slide

Investigation Two methods to determine passwords Social engineering which involves the critical observation of the environment where the targeted computer is located at the time of seizure. continued on next slide

Investigation The examination of the contents of the computers files would include: Internet history/favorites. Calendars. E-mail. Spreadsheets. Word documents. Picture files. Deleted files. continued on next slide

Investigation Forensic computer investigation should be conducted by someone who is well trained. The investigator should know the rules of evidence and be able to testify. Follow the chain-of-evidence procedures.