Presentation is loading. Please wait.

Presentation is loading. Please wait.

14 Cybercrime.

Similar presentations


Presentation on theme: "14 Cybercrime."— Presentation transcript:

1 14 Cybercrime

2 Introduction Early mainframe computers were stand-alone systems and were not interconnected. Security threats were limited to disgruntled or dishonest employees. continued on next slide

3 Introduction In 1981, IBM released personal computers.
In the 1990s, the World Wide Web inter-connected these computers. Cybercrime involves either the computer as the target or as the means to commit the crime.

4 Internal Threats Internal threats come from employees and contractor's employees who have direct access to the employer's computer system. Dishonest employees are motivated by personal gain. Logic bomb is a program within a program that is destructive and acts based on a trigger event. continued on next slide

5 Internal Threats Exiting employees are those leaving their current employment voluntarily. Loyalty is shifting. Exit interview should be conducted to determine why the employee is leaving. Been known to take trade secrets and customer lists continued on next slide

6 Internal Threats Disgruntled employee is one who is motivated by striking back at their employer as the result of some real or imagined wrong. Motivation to get even

7 External Threats Hackers are intruders who enter into another's computer system without authorization. White Hat Hackers are motivated to test their skill against those who design a computer systems security features. continued on next slide

8 External Threats Black Hat Hackers are cyber-criminals and their motivation is to circumvent a computer security for personal gain or vandalism. continued on next slide

9 External Threats Viruses are malicious code that replicates itself and inserts copies in other programs. Worms are like viruses but spread with no human interaction after they are started. continued on next slide

10 External Threats Bot-nets are malware programs that allow remote users to control the computer. Economic espionage occurs when someone takes information for the benefit of someone other than the owner.

11 Fraud Internet allows for committing basic and complex frauds.
FBI and BJA established the Internet Fraud Complaint Center. They receive a quarter million complaints a year, and an annual loss in excess of a half a billion dollars is reported.

12 Fraud Types Auto fraud FBI impersonation
Seller keeps the money for the vehicle and never delivers the car. FBI impersonation Bogus inheritance, lottery winnings, and extortion continued on next slide

13 Fraud Types Scareware/Ransomware involves a pop-up message on the computer indicated that it has been infected with a virus, and the victim sends money to pay for a software to fix the problem. continued on next slide

14 Fraud Types Real estate/timeshare involves the victim sending money for a house or vacation and the place doesn't exist or information is used from the application to steal the identity. Romance scams involve the victim believing they are in a real relationship and the perpetrator faking the relationship to obtain money.

15 Identity Theft Identity theft involves the steal of a person's identity to obtain credit and buy merchandise without the intention of paying. Phishing involves the victim getting an from a bank requesting verification and the victim providing the offender with personal information.

16 Child Pornography The first Amendment's protections of free speech do not apply to child pornography. Child pornography market increased dramatically with the advent of the Internet. Estimated over one million pornographic images of children on the Internet continued on next slide

17 Child Pornography Child pornography comes to the attention of investigators by: Informants Computer technicians Search incident to an arrest Chat rooms

18 Child Molesters Child molesters are constantly in search of new victims. Victims are primarily found via the Internet. Offender are adept at manipulation. Investigators pose as children in these chat rooms. Suspects can be arrested for arriving at a meeting place to meet the "child".

19 Contraband Sales Contraband is illegal goods and the Internet has spurred the sales of such items. Deep Web allowed users to access the Internet without divulging their identities. continued on next slide

20 Contraband Sales Onion Routing is what the system is called because of the many layers of encryption. Bitcoins is a form of unregulated Internet currency.

21 Terrorism Our critical national infrastructure is dependant on computer networks. This makes them targets for terrorism. To date, cyber terrorism has not happened in the United States. continued on next slide

22 Terrorism Cyber terrorism is inexpensive, less personal risk, wide variety of targets to chose, requires less training, and has potential to affect a large number of people. Hacktivism is not cyber terrorism. It is politically motivated and wants to protest and disrupt Internet functions.

23 Investigation Forensic examination is needed in cybercrime.
Seizure of the electronics is the first step. Searches of electronics can be obtained through consent or a warrant. continued on next slide

24 Investigation Two methods to determine passwords
Blunt force attack involves the use of software that systematically enters every combination of letters, characters, and numbers until the password is discovered. Success depends on the level of the password. continued on next slide

25 Investigation Two methods to determine passwords
Social engineering which involves the critical observation of the environment where the targeted computer is located at the time of seizure. continued on next slide

26 Investigation The examination of the contents of the computers files would include: Internet history/favorites. Calendars. . Spreadsheets. Word documents. Picture files. Deleted files. continued on next slide

27 Investigation Forensic computer investigation should be conducted by someone who is well trained. The investigator should know the rules of evidence and be able to testify. Follow the chain-of-evidence procedures.


Download ppt "14 Cybercrime."

Similar presentations


Ads by Google