Cyber Crime – “Is the Internet the new “Wild Wild West?” Prepared for the Southern Massachusetts E-Commerce Network Nov 5 2004 by Suzanne Mello www.suzannemello.com.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Breaking Trust On The Internet
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.
CYBER CRIME AND SECURITY TRENDS
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Security for Seniors SeniorNet Help Desk
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Viruses.
IT Security for Users By Matthew Moody.
Cyber crime & Security Prepared by : Rughani Zarana.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
CYBER CRIME.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
We are here to help you… Fight something like this Brownies !
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Internet Safety Internet Safety LPM
All about viruses, hacking and backups By Harriet Thomas.
Cyber Crime – “Is the Internet the new “Wild Wild West?”
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
All you need to know to keep you and your computer safe!!!
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cyber Crime Prepared for the Southern Massachusetts E-Commerce Network Nov by Suzanne Mello
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Cyber Crime – “Is the Internet the new “Wild Wild West?” CJ216 Unit 8 Semina r.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Safety.
Risk of the Internet At Home
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Presentation transcript:

Cyber Crime – “Is the Internet the new “Wild Wild West?” Prepared for the Southern Massachusetts E-Commerce Network Nov by Suzanne Mello

E-Commerce Network - Suzanne Mello - Nov In the News……. 1 out of 5 children received a sexual solicitation or approach over the Internet in a one-year period of time ( California warns of massive ID theft – personal data stolen from computers at University of California, Berkeley (Oct 21, 2004 IDG news service) Microsoft and Cisco announced a new initiative to work together to increase internet security (Oct 18,

E-Commerce Network - Suzanne Mello - Nov The New Wild Wild West More cyber criminals than cyber cops Criminals feel “safe” committing crimes from the privacy of their own homes Brand new challenges facing law enforcement Most not trained in the technologies Most not trained in the technologies Internet crimes span multiple jurisdictions Internet crimes span multiple jurisdictions Need to retrofit new crimes to existing laws Need to retrofit new crimes to existing laws

E-Commerce Network - Suzanne Mello - Nov Computer Crime Computer used to commit a crime Child porn, threatening , assuming someone’s identity, sexual harassment, defamation, spam, phishing Child porn, threatening , assuming someone’s identity, sexual harassment, defamation, spam, phishing Computer as a target of a crime Viruses, worms, industrial espionage, software piracy, hacking Viruses, worms, industrial espionage, software piracy, hacking

E-Commerce Network - Suzanne Mello - Nov Computer Forensics What is it? an autopsy of a computer or network to uncover digital evidence of a crime an autopsy of a computer or network to uncover digital evidence of a crime Evidence must be preserved and hold up in a court of law Evidence must be preserved and hold up in a court of law Growing field – Many becoming computer forensic savvy FBI, State and Local Police, IRS, Homeland Security FBI, State and Local Police, IRS, Homeland Security Defense attorneys, judges and prosecutors Defense attorneys, judges and prosecutors Independent security agencies Independent security agencies White hat or Ethical Hackers White hat or Ethical Hackers Programs offered at major universities such as URI Programs offered at major universities such as URI

E-Commerce Network - Suzanne Mello - Nov Uncovering Digital Evidence Smart Criminals don’t use their own computers Floppy disks Zip/Jazz disks Tapes Digital cameras Memory sticks PrintersCDsPDAs Game boxes Networks Hard drives

E-Commerce Network - Suzanne Mello - Nov Digital Evidence Criminals Hide Evidence Delete their files and s Hide their files by encryption, password protection, or embedding them in unrelated files (dll, os etc) Use Wi-Fi networks and cyber cafes to cover their tracks Forensics Uncover Evidence Restore deleted files and s – they are still really there! Find the hidden files through complex password, encryption programs, and searching techniques Track them down through the digital trail - IP addresses to ISPs to the offender Not obvious…….it’s most likely hidden on purpose or needs to be unearthed by forensics experts

E-Commerce Network - Suzanne Mello - Nov The Crime Scene (with Computer Forensics) Similar to traditional crime scenes Must acquire the evidence while preserving the integrity of the evidence Must acquire the evidence while preserving the integrity of the evidence No damage during collection, transportation, or storage Document everything Collect everything the first time Establish a chain of custody Establish a chain of custody But also different……. Can perform analysis of evidence on exact copy! Can perform analysis of evidence on exact copy! Make many copies and investigate them without touching original Make many copies and investigate them without touching original Can use time stamping/hash code techniques to prove evidence hasn’t been compromised Can use time stamping/hash code techniques to prove evidence hasn’t been compromised

Top Cyber Crimes that Attack Business SpamViruses/Worms Industrial Espionage and Hackers Wi-Fi High Jacking

E-Commerce Network - Suzanne Mello - Nov Spam “Spam accounts for 9 out of every 10 s in the United States.” MessageLabs, Inc., an management and security company based in New York. “We do not object to the use of this slang term to describe UCE (unsolicited commercial ), although we do object to the use of the word “spam” as a trademark and the use of our product image in association with that term”

E-Commerce Network - Suzanne Mello - Nov Can-Spam Act of 2003 Controlling the Assault of Non-Solicited Pornography and Marketing Act (Can-Spam) Signed into law by President Bush on Dec 16, 2003 Took effect Jan 1, 2004 Took effect Jan 1, 2004 Unsolicited commercial must: Be labeled Be labeled Include Opt-Out instructions Include Opt-Out instructions No false headers No false headers FTC is authorized (but not required) to establish a “do-not- ” registry –lists all the latest in federal, state, and international laws

Suzanne Mello - Nov Spam is Hostile You pay for Spam, not Spammers costs are paid by recipients costs are paid by recipients Spam can be dangerous Never click on the opt-out link! Never click on the opt-out link! May take you to hostile web site where mouse-over downloads an.exe Tells spammers they found a working address Tells spammers they found a working address They won’t take you off the list anyway They won’t take you off the list anyway What should you do? Filter it out whenever possible Filter it out whenever possible Keep filters up to date Keep filters up to date If you get it, just delete the If you get it, just delete the

E-Commerce Network - Suzanne Mello - Nov Viruses and Worms Different types of “ailments” Viruses software that piggybacks on other software and runs when you run something else software that piggybacks on other software and runs when you run something else Macro in excel, word Macro in excel, word Transmitted through sharing programs on bulletin boards Passing around floppy disks An.exe,.com file in your An.exe,.com file in your Worms software that uses computer networks to find security holes to get in to your computer – usually in Microsoft OS!! But worm for MAC was recently written software that uses computer networks to find security holes to get in to your computer – usually in Microsoft OS!! But worm for MAC was recently written

E-Commerce Network - Suzanne Mello - Nov Hackers are Everywhere Stealing data Industrial Espionage Industrial Espionage Identity theft Identity theft Defamation Defamation Deleting data for fun A lot of bored 16 year olds late at night A lot of bored 16 year olds late at night Turning computers into zombies To commit crimes To commit crimes Take down networks Take down networks Distribute porn Distribute porn Harass someone Harass someone Ethical/white hat hackers exist too Help break into networks to prevent crimes Help break into networks to prevent crimes Mafia Boy

E-Commerce Network - Suzanne Mello - Nov Wireless Fidelity (Wi-Fi) Using antennas to create “hot spots” Hotspots – Internet Access (sometimes free) Newport Harbor - All the boats in Harbor have internet access Newport Harbor - All the boats in Harbor have internet access San Francisco Giants Stadium – Surf the web while catching a game San Francisco Giants Stadium – Surf the web while catching a game UMass (need to register, but it’s free) UMass (need to register, but it’s free) Cambridge, MA Cambridge, MA Philadelphia, PA – just announced – entire city by 2006 Philadelphia, PA – just announced – entire city by 2006

E-Commerce Network - Suzanne Mello - Nov Wi-Fi High Jacking 60-70% wireless networks are wide open Why are the Wi-Fi networks unprotected? Most people say “Our data is boring” Most people say “Our data is boring” But… criminals look for wireless networks to commit their crimes But… criminals look for wireless networks to commit their crimes And… the authorities will come knocking on your door….. And… the authorities will come knocking on your door…..

E-Commerce Network - Suzanne Mello - Nov Protect your Computers! Use anti-virus software and firewalls - keep them up to date Keep your operating system up to date with critical security updates and patches Don't open s or attachments from unknown sources Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist Back-up your computer data on disks or CDs often Don't share access to your computers with strangers If you have a wi-fi network, password protect it Disconnect from the Internet when not in use Reevaluate your security on a regular basis Make sure your employees and family members know this info too!

Thank you!

E-Commerce Network - Suzanne Mello - Nov Web sites of Interest operation web snare – latest cyber crimes to be aware of