Introduction and Overview of Digital Crime and Digital Terrorism

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Identity Theft and Phishing: What You Need to Know.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Chapter 14 Crime and Justice in the New Millennium
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 1 Introduction to Security
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Computer Crime and CyberCrime Why we need Computer Forensics.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Computer Crime and Information Technology Security
Defining Security Issues
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Cyber crime & Security Prepared by : Rughani Zarana.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
C YBER C RIME any criminal act dealing with computers and networks traditional crimes conducted through the Internet.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Larry J. Siegel Valerie Bell University of Cincinnati, Cincinnati, OH Chapter Twelve Enterprise Crime: White-Collar Crime, Cyber.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Topic 5: Basic Security.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Cybercrime What is it, what does it cost, & how is it regulated?
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
A threat to global security and economy Koushik Mannepalli CMPE 294.
Computer crimes.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Identity Theft One of America's fastest growing crimes.
Security Mindset Lesson Introduction Why is cyber security important?
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cyber Security. Objectives To understand: 1.Definition of Cyber Crime 2.Classification of Cyber crimes 3.Computer Intrusions and Hacking 4.Computer Security.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Computer Security Mike Asoodeh & Ray Dejean Office of Technology Southeastern Louisiana University.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Computer Crimes Justin A. Sarvey. Overview Define computer crime Define computer crime Examples of computer crime Examples of computer crime Statistics.
Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE.
14 Cybercrime.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Cyber crime and security issues
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
A Project on CYBER SECURITY
Computer Crime CJ 520 / CJ October 27, 2010.
Seminar On Cyber Crime Submitted To: Submitted By:
Chapter 11 crime and security in the networked economy
Presentation transcript:

Introduction and Overview of Digital Crime and Digital Terrorism Chapter 1

Introduction Digital Crime: Viruses destroying data Viruses shutting down the internet computer thieves stealing credit card and social security numbers identity theft laundering money using the internet to coordinate terrorist attacks. These are endemic to the growing problems of digital crime and digital terrorism.

Historical Perspective The first electronic computer was completed in 1945, and the first long distance electronic communication on the internet was sent in 1969.

New Threats in the Information Age Traditional criminal acts: most prominently the production and distribution of child pornography financial crimes information and corporate espionage exploitation stalking identity theft. In 1997, fraudulent VISA transactions were reported at $828 million.

The Cost of Digital Crime The Intellectual Property Section of the U.S. Department of Justice estimates cybercrime costs as high as $10 billion annually.

Increases in Cybervictimization Vulnerability from within an organization is the most dangerous and poses the most serious threat. One study estimated that 90% of economic computer crimes were committed by employees of the victimized companies. Recent studies in North America and Europe determined that 73% of the risk to computer security is from internal sources while only 23% is attributable to external sources.

Types of Computer Crime Computer as a target Computer as an instrument of the crime Computer as incidental to crime Crimes associated with the prevalence of computers

The Computer as a Target Data alteration and denial directly targets the computer by attacking the useful information stored or processed by the computer. The primary difference between data alteration and network intrusion is the intent of the intruder.

What is the value of the loss? Kevin Mitnick (poster boy of hackers) – the prosecution of Mitnick relied on estimates of the value of software he downloaded but did not alter. FBI directed the companies to estimate the total development costs of the software. Since Mitnick did not deprive the companies of the product of their research and development, it seems that the actual economic harm caused would be less than the total cost.

The Computer as an Instrument of a Crime Using the computer as the instrument of the crime means that the computer is used to gain some other criminal objective. Theft is the taking of property with the intent of permanently depriving the owner of their property or service. Market-sensitive proprietary information, financial information, trade secrets, process technology information, human resources information, customer information, information products, transitory information, and security information can all have value to the owner.

Is it theft? Is copying the data a loss to the owner? The owner either maintains confidence in the integrity of the information or controls the distribution of the information to maintain its value.

The Salami Slice Scam (Real Assets) The salami slice technique is a money crime; it is an automated means of stealing assets from a large number of transactions. In the round down salami technique, the computer is used to round calculated dollar amounts down to the nearest cent.

Shopping Cart Fraud and Pyramid Schemes Shopping cart fraud is an example of consumer fraud against a business. Once purchases are selected, the computer criminal saves a copy of the purchase page and alters the prices. Pyramid schemes have found a new source of legitimacy with professional-appearing Web sites and official-sounding Web addresses.

The Computer as Incidental to a Crime The computer is not the primary instrument of the crime; it simply facilitates it. These crimes include money laundering, criminal enterprise, recipes child pornography, and luring victims into compromising situations.

Crimes Associated with the Prevalence of Computers Large-scale software piracy began in Asia. Three major credit reporting bureaus control the information on all persons applying for credit in the United States: Equifax, Trans Union, and Experian. These companies allow anyone with a name and Social Security number to access credit histories.