Computer and Internet Crimes By: Tracey Ross & Tommy Brown.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
How to protect yourself, your computer, and others on the internet
Introduction and Overview of Digital Crime and Digital Terrorism
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Cyber X-Force-SMS alert system for threats.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Chapter Nine Maintaining a Computer Part III: Malware.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Viruses.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Unit 2 - Hardware Computer Security.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
By Ramneek Hundal.. 5 types of Virus.. I LOVE YOUI LOVE YOU. WormsWorms.TROJEN HORES.MELISSA.HAPPY 99 What is a virus. A computer virus is a computer.
CYBER CRIME.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Computer Skills and Applications Computer Security.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Computer crimes.
Computer Security By Duncan Hall.
Understand Malware LESSON Security Fundamentals.
INTRODUCTION & QUESTIONS.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
QUESTION… Is the internet bad?. GOODBad News/Finances Homework Research Shopping Games Education Sports Travel Entertainment Genealogy Pornography.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
3.6 Fundamentals of cyber security
IT Security  .
A Project on CYBER SECURITY
Chapter 11 crime and security in the networked economy
COMPUTER CRIME.
A Gift of Fire Third edition Sara Baase
Internet Safety Vocabulary
Malware CJ
HOW DO I KEEP MY COMPUTER SAFE?
Top Five Computer Related Crimes
Computer Security.
Presentation transcript:

Computer and Internet Crimes By: Tracey Ross & Tommy Brown

Facts Crimes committed using the computer or Internet can be more costly than other crimes (e.g., a bank robber may get $2,500 to $5,000 on average; average loss from computer fraud is $100,000) Crimes committed using the computer or Internet can be more costly than other crimes (e.g., a bank robber may get $2,500 to $5,000 on average; average loss from computer fraud is $100,000) Crimes are larger and affect more people (a hacker breaking into an e-commerce database can steal hundreds or thousands of credit card numbers) Crimes are larger and affect more people (a hacker breaking into an e-commerce database can steal hundreds or thousands of credit card numbers) Crimes are harder to detect and trace (e.g., the anonymity of the Web) Crimes are harder to detect and trace (e.g., the anonymity of the Web) Computing provides new challenges for prevention, detection, and prosecution; challenges that professionals will be asked to meet. Computing provides new challenges for prevention, detection, and prosecution; challenges that professionals will be asked to meet.

Hacking Originally, a “hacker” was a creative programmer who wrote elegant or creative code. Originally, a “hacker” was a creative programmer who wrote elegant or creative code. Sometimes these folks would break into the computer systems at their schools to experiment and have fun Sometimes these folks would break into the computer systems at their schools to experiment and have fun The meaning of hacker began to change. There were incidents of “trophy hacking” (doing it just to show you could do it). The meaning of hacker began to change. There were incidents of “trophy hacking” (doing it just to show you could do it). The case of Kevin Mitnick; a notorious hacker who was arrested in 1988 and finally tracked down and arrested again in He caused several million dollars of damage. The case of Kevin Mitnick; a notorious hacker who was arrested in 1988 and finally tracked down and arrested again in He caused several million dollars of damage. After the Web era After the Web era Current hacking includes all previous pranks and crimes, but now we have the intricate interconnectnedness of the Web. Current hacking includes all previous pranks and crimes, but now we have the intricate interconnectnedness of the Web. Every networked computer is potentially vulnerable. This includes basic infrastructure (water, power, banks, hospitals, transportation, government agencies, telephone companies, etc.). Every networked computer is potentially vulnerable. This includes basic infrastructure (water, power, banks, hospitals, transportation, government agencies, telephone companies, etc.).

Types of Viruses Worms: malicious programs that copy themselves from system to system, rather than infiltrating legitimate files Worms: malicious programs that copy themselves from system to system, rather than infiltrating legitimate files “Back-door” worms that exploit vulnerabilities to enter surrepticiously and copy private information. “Back-door” worms that exploit vulnerabilities to enter surrepticiously and copy private information. Trojans: associated with remote access programs that perform illicit operations such as password-stealing Trojans: associated with remote access programs that perform illicit operations such as password-stealing denial service attacks: involves flooding a target system with so much data, traffic, or commands that it can no longer perform its core functions. denial service attacks: involves flooding a target system with so much data, traffic, or commands that it can no longer perform its core functions.

Viruses Now we have viruses transmitted via that spread like real diseases; there often have to be quarantine procedures. Now we have viruses transmitted via that spread like real diseases; there often have to be quarantine procedures. -The “Love Bug” from 2000 cost an estimated $10 billion in damage. -The “Love Bug” from 2000 cost an estimated $10 billion in damage. -Defacto standard systems (e.g., Microsoft Windows and Outlook) are especially vulnerable; other systems (e.g., Mac OS) are less so; but all are vulnerable. -Defacto standard systems (e.g., Microsoft Windows and Outlook) are especially vulnerable; other systems (e.g., Mac OS) are less so; but all are vulnerable.

Online Scams Auctions Auctions Sell nonexistent/faulty/etc merchandise Sell nonexistent/faulty/etc merchandise Response Response Credit card required to buy or sell Credit card required to buy or sell Escrow services -- trusted middleman Escrow services -- trusted middleman Shill bidding Shill bidding Pretend customers/bidders used to get others to bid more money Pretend customers/bidders used to get others to bid more money Stock fraud Stock fraud Buy a lot of worthless stock Buy a lot of worthless stock Hype it on the internet Hype it on the internet Sell it all at the new high price Sell it all at the new high price

File Sharing Allow you to download computer applications and multimedia files from others on the Internet Allow you to download computer applications and multimedia files from others on the Internet Most P-2-P are configured by default to allow others access to your computer resources Most P-2-P are configured by default to allow others access to your computer resources Some P-2-P programs are susceptible to attacks and may allow others FULL access and control of your computer Some P-2-P programs are susceptible to attacks and may allow others FULL access and control of your computer Some P-2-P have been found to have “back- doors” Some P-2-P have been found to have “back- doors”

Crimes Against Children Today, with so many children online, the Internet provides predators a new place—cyberspace—to target children for criminal acts. This approach eliminates many of the risks predators face when making contact in person. Today, with so many children online, the Internet provides predators a new place—cyberspace—to target children for criminal acts. This approach eliminates many of the risks predators face when making contact in person. The danger to children is greater today because the Internet provides predators anonymity. The danger to children is greater today because the Internet provides predators anonymity. The predator may initiate an online friendship with a young person and build the child’s trust, which will allow the predator to get what he or she ultimately wants from the child. The predator may initiate an online friendship with a young person and build the child’s trust, which will allow the predator to get what he or she ultimately wants from the child.

Types of Internet Crimes Against Children Enticing them through online contact for the purpose of engaging them in sexual acts. Enticing them through online contact for the purpose of engaging them in sexual acts. Using the Internet for the production, manufacture, and distribution of child pornography. Using the Internet for the production, manufacture, and distribution of child pornography. Using the Internet to expose youth to child pornography and encourage them to exchange pornography. Using the Internet to expose youth to child pornography and encourage them to exchange pornography. Enticing and exploiting children for the purpose of sexual tourism (travel with the intent to engage in sexual behavior) for commercial gain and/or personal gratification. Enticing and exploiting children for the purpose of sexual tourism (travel with the intent to engage in sexual behavior) for commercial gain and/or personal gratification.