Computer Forensics BACS 371

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
2 Language of Computer Crime Investigation
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cybercrime and Cyberrelated Crimes Home. Background Cybercrime before networked computers Cybercrime before networked computers Hacker: now a pejorative.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Mohd Taufik Abdullah Department of Computer Science
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
BUSINESS PLUG-IN B6 Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Computer Security & Safety
Cyber X-Force-SMS alert system for threats.
Chapter 1 Introduction to Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Computer Forensics BACS 371
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Computer Crime and CyberCrime Why we need Computer Forensics.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Computer Crime and Information Technology Security
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Information Warfare Playgrounds to Battlegrounds.
7 Information Security.
Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Lecture 21 Computer Security Ethics
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Cybercrime What is it, what does it cost, & how is it regulated?
Information Warfare Playgrounds to Battlegrounds.
Computer crimes.
Security and Ethics Safeguards and Codes of Conduct.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
14 Cybercrime.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Add video notes to lecture
Threats By Dr. Shadi Masadeh.
Seminar On Cyber Crime Submitted To: Submitted By:
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Introduction to Computer Forensics
Chapter 13 Security and Ethical Challenges.
SECURITY POLICIES, LAWS AND COMPUTER CRIMES (CCI410) PERTEMUAN 12
Information Systems for Health:
Chapter 12 Technology and Crime: It’s a Double-Edged Sword
Presentation transcript:

Computer Forensics BACS 371 CyberCrime: Background and Motivation

Outline Categories of Computer Crime Types of CyberCrime Trends in CyberCrime Sources of CyberCrime Stakeholders in CyberCrime Hacker Types and Motivation

Definition of CyberCrime CyberCrime is “any violations of criminal law that involve knowledge of computer technology for their perpetration.”

USDOJ Categories1 Hardware as Contraband or Fruits of a Crime Hardware as an Instrumentality Hardware as Evidence Information as Contraband or Fruits of a Crime Information as an Instrumentality Information as Evidence 1 US Dept of Justice, Search and Seizure Guidelines Document

Categories of Computer Crime1 A computer can be the object of a crime A computer can be the subject of a crime The computer can be used as the tool for conducting or planning a crime Includes… compromising a computer and using that computer as a source for further attacks The symbol of the computer itself can be used to intimidate or deceive The most significant omission, according to Casey, is computers as sources of digital evidence 1 from Donn Parker as described in Eoghan Casey, Digital Evidence and Computer Crime

Categories of Computer Crime Computers as targets Computers as storage devices Computers as communication tools Same ole stuff, but computers are involved!!

Categories of Computer Crime cont. Computers as targets: Attack on the confidentiality, integrity, or availability of a computer’s information or services. Acquire information on the computer Control the target system without authorization or payment Alter integrity of data or interfere with delivery of service

Categories of Computer Crime cont. Computers as storage devices: Passive storage of information concerning a crime. Computers as a communication tool: Traditional crimes committed online. Email or chat used to plan a crime.

Types of CyberCrime DoS and DDoS Attacks Intellectual Property Theft Trade secrets Piracy Identity Theft Fraud Extortion Cyberstalking Transmission of Malware Hacking Spamming Sale of Purchase of Narcotics over Internet Gambling DoS and DDoS Attacks – Attacker floods target computer with so much traffic that it overwhelms the server. Deprives users of server access. Intellectual Property Theft – Theft of copyrighted material or private material that results in revenue loss or loss of value Trade secrets – designs of new products for example Piracy – theft of copyrighted material by illegal copying or counterfeiting Identity Theft – Wrongly using another persons identify to commit fraud Fraud – A crime that involves intentional deception for personal gain or to cause damage to another. Must be 1) intentional, 2) cause loss of > $5000, and 3) access must be unauthorized Extortion – Attempt to gain something of value by threating a victim. Cyberstalking – Using Internet, email, or other electronic means to harass another person. Transmission of Malware – distributing a malware program that attacker knows will cause damage. (not illegal to create them). Unintentional transmission is also a crime. Hacking – Illegal intrusion into computer system without permission. Spamming – Unsolicited or undesired electronic messages sent in large quntities. Sale of Purchase of Narcotics over Internet – Same laws as physical sale. Gambling – Against US law.

Trends in CyberCrime Number of threats targeting enterprises has increased. Attack toolkits make the crime easier. Web-based attacks are more numerous. Emerging countries are having increased activity.

Complaint Type Percentages 2011

Complaint Count 2001 -- 2011

Crime Complaint Categories 2011

Sources of CyberCrimes Nation-States Cyberterrorists Organized crime Activists Corporations Individuals

Stakeholders in Computer Crime Government/National Security Government/Customs & Excise Lawyers Courts Police Businesses Insurance firms Corporate crime International (transnational) crime Personal (privacy)

Categories of Computer Criminals Newbies (script kiddies) Cyberpunks Internals Coders Old guard Professional criminals Cyberterrorists

Hacker Types Thrill-seeker Hackers White-Hat Hackers Black-Hat Hackers Crackers Hacktivists Classic Mischievous Kid Disgruntled Employee Robber Ringleader Social Engineering Social engineering is the act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud or computer system access; in most cases the attacker never comes face-to-face with the victim.

Steal money or services Why do Hackers Hack?* Revenge Profit Money and Monetary Tools Banks Stocks Digital Goods Pride Intellectual Challenge (Curiosity) Damage Business Steal money or services Damage files Invade privacy Be noticed Explore Revenge X Profit Pride Curiosity * Steven Branigan, High-Tech Crimes Revealed, Addison Wesley, 2005

Opportunities for Cybercriminals Affordability – Equipment and software becoming cheaper Acceptable risk – Risk of being caught is relatively low. Small scale criminals often not aggressively prosecuted. Attractiveness – More available targets. Laws not always current. Availability – Each Internet access for perp and victim. Anonymity – Internet gives the illusion of anonymity.