Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer and Internet Crimes By: Tracey Ross & Tommy Brown.

Similar presentations


Presentation on theme: "Computer and Internet Crimes By: Tracey Ross & Tommy Brown."— Presentation transcript:

1 Computer and Internet Crimes By: Tracey Ross & Tommy Brown

2 Facts Crimes committed using the computer or Internet can be more costly than other crimes (e.g., a bank robber may get $2,500 to $5,000 on average; average loss from computer fraud is $100,000) Crimes committed using the computer or Internet can be more costly than other crimes (e.g., a bank robber may get $2,500 to $5,000 on average; average loss from computer fraud is $100,000) Crimes are larger and affect more people (a hacker breaking into an e-commerce database can steal hundreds or thousands of credit card numbers) Crimes are larger and affect more people (a hacker breaking into an e-commerce database can steal hundreds or thousands of credit card numbers) Crimes are harder to detect and trace (e.g., the anonymity of the Web) Crimes are harder to detect and trace (e.g., the anonymity of the Web) Computing provides new challenges for prevention, detection, and prosecution; challenges that professionals will be asked to meet. Computing provides new challenges for prevention, detection, and prosecution; challenges that professionals will be asked to meet.

3 Hacking 1960-1970 1960-1970 Originally, a “hacker” was a creative programmer who wrote elegant or creative code. Originally, a “hacker” was a creative programmer who wrote elegant or creative code. Sometimes these folks would break into the computer systems at their schools to experiment and have fun Sometimes these folks would break into the computer systems at their schools to experiment and have fun 1970-1995 1970-1995 The meaning of hacker began to change. There were incidents of “trophy hacking” (doing it just to show you could do it). The meaning of hacker began to change. There were incidents of “trophy hacking” (doing it just to show you could do it). The case of Kevin Mitnick; a notorious hacker who was arrested in 1988 and finally tracked down and arrested again in 1995. He caused several million dollars of damage. The case of Kevin Mitnick; a notorious hacker who was arrested in 1988 and finally tracked down and arrested again in 1995. He caused several million dollars of damage. After 1995--the Web era After 1995--the Web era Current hacking includes all previous pranks and crimes, but now we have the intricate interconnectnedness of the Web. Current hacking includes all previous pranks and crimes, but now we have the intricate interconnectnedness of the Web. Every networked computer is potentially vulnerable. This includes basic infrastructure (water, power, banks, hospitals, transportation, government agencies, telephone companies, etc.). Every networked computer is potentially vulnerable. This includes basic infrastructure (water, power, banks, hospitals, transportation, government agencies, telephone companies, etc.).

4 Types of Viruses Worms: malicious programs that copy themselves from system to system, rather than infiltrating legitimate files Worms: malicious programs that copy themselves from system to system, rather than infiltrating legitimate files “Back-door” worms that exploit vulnerabilities to enter surrepticiously and copy private information. “Back-door” worms that exploit vulnerabilities to enter surrepticiously and copy private information. Trojans: associated with remote access programs that perform illicit operations such as password-stealing Trojans: associated with remote access programs that perform illicit operations such as password-stealing denial service attacks: involves flooding a target system with so much data, traffic, or commands that it can no longer perform its core functions. denial service attacks: involves flooding a target system with so much data, traffic, or commands that it can no longer perform its core functions.

5 Viruses Now we have viruses transmitted via email that spread like real diseases; there often have to be quarantine procedures. Now we have viruses transmitted via email that spread like real diseases; there often have to be quarantine procedures. -The “Love Bug” from 2000 cost an estimated $10 billion in damage. -The “Love Bug” from 2000 cost an estimated $10 billion in damage. -Defacto standard systems (e.g., Microsoft Windows and Outlook) are especially vulnerable; other systems (e.g., Mac OS) are less so; but all are vulnerable. -Defacto standard systems (e.g., Microsoft Windows and Outlook) are especially vulnerable; other systems (e.g., Mac OS) are less so; but all are vulnerable.

6 Online Scams Auctions Auctions Sell nonexistent/faulty/etc merchandise Sell nonexistent/faulty/etc merchandise Response Response Credit card required to buy or sell Credit card required to buy or sell Escrow services -- trusted middleman Escrow services -- trusted middleman Shill bidding Shill bidding Pretend customers/bidders used to get others to bid more money Pretend customers/bidders used to get others to bid more money Stock fraud Stock fraud Buy a lot of worthless stock Buy a lot of worthless stock Hype it on the internet Hype it on the internet Sell it all at the new high price Sell it all at the new high price

7 File Sharing Allow you to download computer applications and multimedia files from others on the Internet Allow you to download computer applications and multimedia files from others on the Internet Most P-2-P are configured by default to allow others access to your computer resources Most P-2-P are configured by default to allow others access to your computer resources Some P-2-P programs are susceptible to attacks and may allow others FULL access and control of your computer Some P-2-P programs are susceptible to attacks and may allow others FULL access and control of your computer Some P-2-P have been found to have “back- doors” Some P-2-P have been found to have “back- doors”

8 Crimes Against Children Today, with so many children online, the Internet provides predators a new place—cyberspace—to target children for criminal acts. This approach eliminates many of the risks predators face when making contact in person. Today, with so many children online, the Internet provides predators a new place—cyberspace—to target children for criminal acts. This approach eliminates many of the risks predators face when making contact in person. The danger to children is greater today because the Internet provides predators anonymity. The danger to children is greater today because the Internet provides predators anonymity. The predator may initiate an online friendship with a young person and build the child’s trust, which will allow the predator to get what he or she ultimately wants from the child. The predator may initiate an online friendship with a young person and build the child’s trust, which will allow the predator to get what he or she ultimately wants from the child.

9 Types of Internet Crimes Against Children Enticing them through online contact for the purpose of engaging them in sexual acts. Enticing them through online contact for the purpose of engaging them in sexual acts. Using the Internet for the production, manufacture, and distribution of child pornography. Using the Internet for the production, manufacture, and distribution of child pornography. Using the Internet to expose youth to child pornography and encourage them to exchange pornography. Using the Internet to expose youth to child pornography and encourage them to exchange pornography. Enticing and exploiting children for the purpose of sexual tourism (travel with the intent to engage in sexual behavior) for commercial gain and/or personal gratification. Enticing and exploiting children for the purpose of sexual tourism (travel with the intent to engage in sexual behavior) for commercial gain and/or personal gratification.

10


Download ppt "Computer and Internet Crimes By: Tracey Ross & Tommy Brown."

Similar presentations


Ads by Google