Computer Crime CJ 520 / CJ 600 1.0 October 27, 2010.

Slides:



Advertisements
Similar presentations
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Security Classification Practical Issues in dealing with different types of cybercrime.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
2 Language of Computer Crime Investigation
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Computer Forensics BACS 371
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
e-Safety What e-Safety? E-safety is about measures and best particles for Netizens to guard their personal safety and the security of their networks.
presentation topic : cyber crimes and security By ashwini awatare
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Computer Crime and Information Technology Security
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
BY: BRENT MILLER. What is Computer Crime? Crime involving a computer and a network. A computer may be used or targeted. Divided into two categories: Crimes.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
CYBER CRIME.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
C YBER C RIME any criminal act dealing with computers and networks traditional crimes conducted through the Internet.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 4E, by Henry R. Cheeseman Chapter 7 Business.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Computer crimes.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
Types of Crimes Classifying and Counting Crime. Five Major Types of Crime 1. Occupational Crime 2. Organized Crime 3. Visible Crime (street crime) 4.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
International Cooperation against CYBERCRIME IGF-UA Mykola Danyliuk Deputy Chief of Division for Combating Cybercrime Ministry of Interior of Ukraine Division.
Securing Information Systems
Securing Information Systems
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
CYBER FORENSICS | Kiran Bettadapur S. | 5/8/2018.
ESSENTIALS OF THE LEGAL ENVIRONMENT today, 5e
Chapter 7 Criminal Law and Cyber Crimes
Chapter 19.1 Cyberlaw and Cybercrime
A Project on CYBER SECURITY
MODUS OPERANDI OF CYBER CRIME
Seminar On Cyber Crime Submitted To: Submitted By:
Chapter 8 Criminal Law and Cyber Crimes
Crimes against Property
Introduction to Computer Forensics
CHAPTER 4 Information Security.
Assalamualaikum Today, I am going to give a presentation on
Securing Information Systems
Lesson 2- Protecting Yourself Online
Introduction to Computer Forensics
Chapter 9 E-Commerce Security and Fraud Protection
Forensic and Investigative Accounting
The Crime and Deviance Channel
Counter Forensic for Computer Forensic By: Lara Amanj Gulan Azad.
Lesson 2- Protecting Yourself Online
Role of US Security and Intelligence Agencies
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

Computer Crime CJ 520 / CJ 600 1.0 October 27, 2010

Computer Crime “Computer crime, cybercrime, e-crime, hi-tech crime or electronic crime generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime.” --Wikipedia

Why is it important to understand computer crime? Proliferation of technology Reliance on computers Infrastructure vulnerabilities

But is it really a crime? What’s the jurisdiction? What’s the statute? 2000 - I Love You virus

Some Computer Crimes Online threats Cyber-stalking Online child pornography Online gambling Money-laundering Malware Terrorism Counterfeiting Securities fraud Intellectual property theft Hate crimes Espionage Identity theft Exploitation

A few facts Anyone with a computer can pose a threat An estimated 73% of computer crime committed by “insiders’ Computer crime tends to be unreported / under reported

Categories of Computer Crimes How computers can be used in the commission of crimes

Computer as a Target DDOS, data corruption, network intrusion, vandalism Information / Access is a target Data corruption Prevent access of data

Computer as an Instrument Credit card fraud, salami attack, harassment Assists commission of crime Processes of computer, not information

Computer is Incidental Money laundering, loan sharking Not essential for crime Ease in committing crime

Crimes involving prevalence of computers Intellectual property theft, identity theft, equipment theft New versions of old crimes

Some Terminology Mens Rea Actus Reus Prohibative Malfeasance by computer MD5 Hash

Digital Evidence Digital evidence or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial. --Wikipedia

Digital Evidence Facts Can be immense Can be encrypted, disguised, or hidden Is intangible without assistance

Digital Evidence can be: Stored Instrument Target Contraband

Where can digital evidence be found? We must be able to handle and to accurately describe digital evidence

Resources Digital Crime & Digital Terrorism - Chapter One Computer Crime Categories: How Techno-criminals Operate - http://nsi.org/Library/Compsec/crimecom.html