© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Security, Privacy, and Ethics Online Computer Crimes.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 1 Introduction to Security
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
 Major Differences Between Civil and Criminal Law.  Burden of Proof. Civil is preponderance of the evidence. Criminal is proof beyond a reasonable doubt.
Chapter 1: Legal Ethics 1. © 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Cyber Crimes.
BY: BRENT MILLER. What is Computer Crime? Crime involving a computer and a network. A computer may be used or targeted. Divided into two categories: Crimes.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Zimbelman, Albrecht, Albrecht, Albrecht © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Albrecht, Albrecht, Albrecht, Zimbelman Fraud Examination, 4E © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated,
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
World Trade Equilibrium CHAPTER 20 © 2016 CENGAGE LEARNING. ALL RIGHTS RESERVED. MAY NOT BE COPIED, SCANNED, OR DUPLICATED, IN WHOLE OR IN PART, EXCEPT.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Elasticity: Demand and Supply CHAPTER 6 © 2016 CENGAGE LEARNING. ALL RIGHTS RESERVED. MAY NOT BE COPIED, SCANNED, OR DUPLICATED, IN WHOLE OR IN PART, EXCEPT.
Cybercrime What is it, what does it cost, & how is it regulated?
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cybersecurity Test Review Introduction to Digital Technology.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
© 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Managing Windows Security
Chapter 9: Internet Law, Social Media, and Privacy
ESSENTIALS OF THE LEGAL ENVIRONMENT today, 5e
Fundamentals of business law, 10e
GCSE ICT SECURITY THREATS.
Chapter 13 Security and Ethical Challenges.
Essentials of the legal environment today, 5e
Putting it All Together
CHAPTER 1 Introduction to International Macroeconomics
CHAPTER 7 Financial Intermediation, Markets and Intermediaries
Forensic Accounting Chapter 16
Chapter 12 Technology and Crime: It’s a Double-Edged Sword
Presentation transcript:

© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 1 Chapter 7: Cyber Crime

2 © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Learning Objectives What distinguishes cyber crime from “traditional” crime? How has the internet expanded opportunities for identity theft? What are three reasons that cyberstalking may be more commonplace than physical stalking? What are three major reasons the internet is conducive to juvenile cyber crime? How do encryption programs protect digital data from unauthorized access?

3 © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Computer Crime and the Internet Computer Crime: violation of criminal law that involves “knowledge of computer technology for its perpetration, investigation, or prosecution.” Three Categories: –Computer is object of a crime. –Computer is subject of a crime. –Computer is the instrument of a crime.

4 © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Cyber Crimes Against Persons and Property Cyber Computer Fraud. –Persuade victims to spend money on various scams (Nigerian bank accounts, health insurance, travel). Online Auction Fraud. Online Retail Fraud.

5 © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Cyber Crimes Against Persons and Property Cyber Theft. –Identity Theft using novel methods. –Low cost of black- market data. –“Phishing.” –Vishing. –Employment Fraud.

6 © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Cyberstalking California passed first antistalking law in Today 48 states have cyberstalking laws. Threat of Cyberstalking. –Ex-lovers using spyware to monitor keystrokes. –Cyberstalking on Social Networks. Case 7.1 State v. Kline. County where victim resides is appropriate venue for prosecution of cyberstalking crimes.

7 © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Cyber Crimes in the Business World Credit Card Crime on the Web. –Companies take risks in storing customers private information online. Hackers. –Botnets, malware, viruses, and worms can send information from your computer to third party networks. –Juvenile Cyber Crime is a growing threat.

8 © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Cyber Crimes in the Business World Hacking and Cyberterrorism. –Cyberterrorists are stealth hackers trying to exploit computers for maximum impact. –Logic bombs may “explode” computers and online networks. –2009 – Chinese and Russians hacked into our electrical power grid, leaving behind ‘botnet’ software that could hijack facilities. Pirating Intellectual Property Online.

9 © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Spread of Spam Spam: unsolicited “junk” s with ads, solicitations, and other messages. State Regulation of Spam. Federal CAN-SPAM Act. U.S. Safe Web Act. –Allows FTC to share information with foreign agencies investigating and prosecuting cyber crimes. Provides ISP’s with immunity from liability for supplying subscriber information to FTC.

10 © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Cyber Crimes Against the Community – Gambling in Cyberspace Legal Confusion over Online Gambling. –Can citizens of a state in which gambling is illegal, place bets at online casinos located in another state — or country? Congress Takes Action. –Unlawful Internet Gambling Enforcement Act of Case 7.2 United States v. $6,976,934.65, Plus Interest Deposited into Royal Bank of Scotland International. Indictments were sufficiently ‘related’ to the civil forfeiture to apply the fugitive disentitlement statute.

11 © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Fighting Cyber Crime Prosecuting Cyber Crimes. –Threshold questions of jurisdiction and venue. –Identification of wrongdoers is difficult because they do not leave fingerprints or DNA. Computer Fraud and Abuse Act. Private Efforts to Combat Cyber Crime. –Encryption is a good, inexpensive security device. Requires a private and public “key.”