Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved. 4025 W. Peterson Ave. Chicago, IL.

Slides:



Advertisements
Similar presentations
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Advertisements

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Hands-On Ethical Hacking and Network Defense
Forensic and Investigative Accounting
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Forensic and Investigative Accounting
THE HOTTEST JOBS For College Grads FORENSIC ACCOUNTANT Combines accounting, auditing and investigative skills: $30,000-$150,000 LOGISTICS MANAGER Plan,
CYBER CRIME AND SECURITY TRENDS
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Cyber crime & Security Prepared by : Rughani Zarana.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
CYBER CRIME.
Forensic and Investigative Accounting
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
 Collecting Evidence ◦ Subpoenas, court orders, search warrants, electronic surveillance, and traditional methods You have to know where to look! Let’s.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Copyright 2000, Marchany Computer Law Threats and Issues VA Computer Crime Act Randy Marchany VA Tech Computing Center ©Marchany,2001.
Cybercrime What is it, what does it cost, & how is it regulated?
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
Presented by Presented by Daniel Lawrence Delgado CITCS BSIT 1-D.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Forensic and Investigative Accounting Chapter 13 Computer Forensics: A Brief Introduction © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago,
Issues for Computer Users, Electronic Devices, Computer and Safety.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Securing Information Systems
Forensic and Investigative Accounting
Securing Information Systems
Introduction to Computer Forensics
Computer-Based Processing: Developing an Audit Assessment Approach
Chapter 4 Law, Regulations, and Compliance
A Gift of Fire Third edition Sara Baase
Forensic and Investigative Accounting
INFORMATION SYSTEMS SECURITY and CONTROL
Forensic and Investigative Accounting
Forensic and Investigative Accounting
Forensic and Investigative Accounting
Presentation transcript:

Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL

Chapter 15Forensic and Investigative Accounting2 Introduction to Cybercrime Most common complaints: Virus attacks % Virus attacks % Laptop/mobile theft % Laptop/mobile theft % Insider abuse of net access % Insider abuse of net access % Unauthorized access to information % Unauthorized access to information % Denial of service % Denial of service % System penetration % System penetration % Abuse of wireless network… % Abuse of wireless network… % Theft of proprietary information % Theft of proprietary information % Financial Fraud …… % Financial Fraud …… %

Chapter 15Forensic and Investigative Accounting3 Net Frauds Net frauds ensnare unsuspecting Internet users into giving up their resources to an online criminal.

Chapter 15Forensic and Investigative Accounting4 Unauthorized Access to Network Assets Unauthorized access to steal proprietary information can be considered a distinct crime from fraud.

Chapter 15Forensic and Investigative Accounting5 Types of Unauthorized Access Access using wardialers in modem attacks. Access using wardialers in modem attacks. Access via buggy software. Access via buggy software. Access via trusted server. Access via trusted server. Backdoor entry. Backdoor entry. Access via social engineering. Access via social engineering.

Chapter 15Forensic and Investigative Accounting6 Intangible Assets Information on the Internet and in computer databases represents intangible assets composed of bits and bytes. Information on the Internet and in computer databases represents intangible assets composed of bits and bytes. The destruction of electronic representations or the erasure of data without physically damaging a tangible computer asset may not be considered a crime. The destruction of electronic representations or the erasure of data without physically damaging a tangible computer asset may not be considered a crime. (continued on next slide)

Chapter 15Forensic and Investigative Accounting7 Intangible Assets If data is accessed but not used for any purpose, then no crime may have been committed. If data is accessed but not used for any purpose, then no crime may have been committed. Statutes may not provide for the recognition of criminal trespass, a property crime, based on a virtual presence (and no physical presence). Statutes may not provide for the recognition of criminal trespass, a property crime, based on a virtual presence (and no physical presence).

Chapter 15Forensic and Investigative Accounting OECD Time Capsule Recommendations 1. The input, alteration, erasure and/or suppression of computer data and/or computer programmes made willfully with the intent to commit an illegal transfer of funds or of another thing of value; 2. The input, alteration, erasure and/or suppression of computer data and/or computer programmes made willfully with the intent to commit a forgery; (continued on next slide)

Chapter 15Forensic and Investigative Accounting OECD Time Capsule Recommendations 3. The input, alteration, erasure and/or suppression of computer data and/or computer programmes, or other interference with computer systems, made willfully with the intent to hinder the functioning of a computer and/or telecommunication system; 4. The infringement of the exclusive right of the owner of a protected computer programme with the intent to exploit commercially the programme and put it on the market; (continued on next slide)

Chapter 15Forensic and Investigative Accounting OECD Time Capsule Recommendations 5. The access to or the interception of a computer and/or telecommunication system made knowingly and without the authorization of the person responsible for the system, either (i) by infringement of security measures or (ii) for other dishonest or harmful intentions.

Chapter 15Forensic and Investigative Accounting11 Cybercrime or Not? Spoofing. Spoofing. Use of bots. Use of bots. Chaffing. Chaffing. Steganography. Steganography.

Chapter 15Forensic and Investigative Accounting12 International Law Although 249 countries have IP domain registrations, the countries with cybercrime statutes are fewer. Although 249 countries have IP domain registrations, the countries with cybercrime statutes are fewer. Some countries have broad provisions for computer crimes, some have limited provisions, and still some have no provisions at all. Some countries have broad provisions for computer crimes, some have limited provisions, and still some have no provisions at all. (continued on next slide)

Chapter 15Forensic and Investigative Accounting13 International Law In 2001, the Council of Europe Convention on Cybercrime issued a model law for its member states including transactional cooperation recommendations. The Council’s model law has 48 sections for incorporation into national laws on cybercrime.

Chapter 15Forensic and Investigative Accounting14 Federal Statutes Related to Cybercrimes 18 U.S.C Fraud and Related Activity in Connection with Access Devices 18 U.S.C Fraud and Related Activity in Connection with Computers 18 U.S.C Unlawful Access to Stored Communications

Chapter 15Forensic and Investigative Accounting15 USA Patriot Act of 2001 The USA Patriot Act has strengthened U.S. cyber laws and expanded cybercrime definitions. The USA Patriot Act has strengthened U.S. cyber laws and expanded cybercrime definitions. Under the Act, an activity covered by the law is considered a crime if it causes a loss exceeding $5,000, impairment of medical records, harm to a person, or threat to public safety. Under the Act, an activity covered by the law is considered a crime if it causes a loss exceeding $5,000, impairment of medical records, harm to a person, or threat to public safety. (continued on next slide)

Chapter 15Forensic and Investigative Accounting16 USA Patriot Act of 2001 Amendments made by the Act make it easier for an Internet service provider (ISP) to make disclosures about unlawful customer actions without the threat of civil liability to the ISP. Amendments made by the Act make it easier for an Internet service provider (ISP) to make disclosures about unlawful customer actions without the threat of civil liability to the ISP. Another revision made by the Act provides that victims of hackers can request law enforcement help in monitoring trespassers on their computer systems. Another revision made by the Act provides that victims of hackers can request law enforcement help in monitoring trespassers on their computer systems.

Chapter 15Forensic and Investigative Accounting17 State Legislation Many of the states have separately enacted money laundering, identity theft, online gambling, cyberstalking and other Internet statutes in their codes. Many of the states have separately enacted money laundering, identity theft, online gambling, cyberstalking and other Internet statutes in their codes. Many statutes do not refer to “cybercrimes” as they were originally enacted when there was no Internet. Thus, legislative oversight in the acts tends to focus on “computer crimes,” “unlawful access,” or “property crimes.” Many statutes do not refer to “cybercrimes” as they were originally enacted when there was no Internet. Thus, legislative oversight in the acts tends to focus on “computer crimes,” “unlawful access,” or “property crimes.”

Chapter 15Forensic and Investigative Accounting18 Fighting Cybercrime The following list describes the skill set needed to fight cybercrime: –Ability to build an Internet audit trail. –Skills needed to collect “usable” courtroom electronic evidence. –Ability to trace an unauthorized system user. (continued on next slide)

Chapter 15Forensic and Investigative Accounting19 Fighting Cybercrime –Knowledge base to use in recommending or reviewing security policies. –Knowledge of the most recent computer fraud techniques. –Basic understanding of the information that can be collected from various computer logs. –Ability to place a valuation on incurred losses from attacks. (continued on next slide)

Chapter 15Forensic and Investigative Accounting20 Fighting Cybercrime –Technical familiarity with the Internet, web servers, firewalls, attack methodologies, security procedures, and penetration testing. –Understanding of organizational and legal protocols in incident handling to prevent employee rights violations. –An established relationship with law enforcement agencies.

Chapter 15Forensic and Investigative Accounting21 Filing Reports of Cybercrimes An investigator should know where, besides law enforcement, such crimes can be reported. There are a number of websites that collect information about events that may be cybercrimes.