Real Life and in the Virtual World Presented by: Jessica Antes Jennifer Conley Richard Morris Stephanie Schossow Zonia Yee MIS 304 Professor Fang Fang.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi.
How to protect yourself, your computer, and others on the internet
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Introduction and Overview of Digital Crime and Digital Terrorism
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
The Internet.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Security, Privacy, and Ethics Online Computer Crimes.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Discovering Computers 2010
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Cyber crime & Security Prepared by : Rughani Zarana.
By: Catherine Tingle. What is it?  Netiquette refers to appropriate and safe interactions online.
Mrs. Jefferson Business Information Management I.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Unethical use of Computers and Networks
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
By: Tina Hill.  This is the unwritten rules of the different media sites on the internet.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Digital Citizenship Project By Allen Naylor Ed 505.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
CRIMES Used by permission. For Educational purposes only.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Cyber Bullying. ~ instant messaging ~ digital photos ~ cell phones ~ computers ~ web pages ~ social networks ~ ~ instant messaging ~ digital.
1. 1.To discover ethical issues in electronic media and the Internet. 2.To identify different areas of Internet crime. 3.To assess where one should go.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Digital Citizen Project By: Frances Murphey Technology and Education.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Privacy, Security and Ethics
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Issues for Computer Users, Electronic Devices, Computer and Safety.
By: Micah Stevens Identity Theft in the World Today.
Securing Information Systems
Add video notes to lecture
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
A Project on CYBER SECURITY
COMPUTER CRIME.
Chapter 13 Security and Ethical Challenges.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Laws Against Computer Hacking
Presentation transcript:

Real Life and in the Virtual World Presented by: Jessica Antes Jennifer Conley Richard Morris Stephanie Schossow Zonia Yee MIS 304 Professor Fang Fang December 2, 2008

What is Cyber Crime? Cyber crime is an unlawful act wherein computer is either a tool or a target or both, it is also any form of threat to the public or private health or safety using the computer

What is Virtual Crime? Virtual Crime is similar to crimes that happen in real life, but in the virtual world Some examples of where Virtual Crimes can take place are: Second Life MMOR (massively multiplayer online game) WOW (World of Warcraft)

What is a Hacker? The Types? White Hat Grey Hat Black Hat Cyber Terrorist Script Kiddie Hacktivist

Methods of Hacking Security Exploit Vulnerability Scanner Packet Sniffer Spoofing Attack Rootkit Social Engineering Trojan Horse Virus Worm Key Loggers

Hacking Case I Hacktivist attacked NASA in Greenbelt, Maryland Created a worm called WANK, Worms Against Nuclear Killers The worm ran a banner across all across NASA’s system computers Protesting the launch of plutonium – fueled Galileo Probe.

Hacking Case II 17 year old boy with the online name of “Dshocker” attacked other online hackers Charged and pleaded guilty multiple felonies Computer fraud Interstate Threats 4 counts of wire fraud – credit card Launched a phony bomb threat by hacking into computer systems Punished with 11 months in juvenile detention center If he was charged as an adult he would have been convicted with

Piracy and Intellectual Property Theft For electronic and audio-visual media, unauthorized reproduction and distribution is referred to as piracy The unlawful downloading of copyrighted material and sharing of recorded music over the Internet in the form of MP3 and other audio files

Penalties for Piracy Copyright infringement may be liable a copyright owner damages plus any profits made from the infringement Criminal Penalties up to 10 years and $150,000 DMCA- Digital Millennium Copyright Act of 1998 First Offense Fine up to $500,000 5 years imprisonment Subsequent Offenses One million dollar fine 10 years imprisonment

Internet Fraud Internet fraud is any form of fraudulent solicitation to prospective victims. There are several different types of Internet Frauds Identity Theft Purchasing – Financial Scams Direct Solicitations Online Automotive Frauds Cash the Check System Internet Ticket Fraud Phishing

Cash the Check System Scam Richard’s Incident Posted an Ad on Craigslist for a roommate Received a check for $5000 This was to process the deposit and the rent Was asked to send the remaining amount back to the “new roommate” At the end it cost Richard $4000 Loss for rent Bank Fees The money that was sent to “new roommate”

Real life Cyber Laws Phishing Anti-Phishing Act 2005 Identity Theft Comprehensive Identity Theft Prevention Act Fair and Accurate Credit Transactions Act of 2003 Identity Theft Penalty Enhancement Act Identity Theft and Assumption Deterrence Act of 1998 Identity Theft Victims Assistance Act of 2002 Encryption E-Privacy Act

Real Life Cyber Laws Cont… Electronic Checks Check Clearing for the 21 Century Act Privacy Computer Owners’ Bill of Rights Online Personal Privacy Act Online Privacy Protection Act of 2005 SPY BLOCK Act Spyware Control and Privacy Protection Act of 2000 Spam and Spyware Enhanced Consumer Protection Against Spyware Act of 2005 U.S. SAFE WEB Act of 2006 SPY Act

Laws for Virtual Crimes There is currently no laws for Virtual Crimes The United States has not convicted nor tried anyone for virtual crimes If there is any correlation from virtual crime to real life situation, appropriate legal action will be taken Other countries are prosecuting people for virtual crimes, for example: Korea has a special task force specifically for Virtual Crime Investigation Team

Scenario A Missouri woman created a fictitious 16 year old boy on MySpace. Sent flirtatious messages to a 16 year old girl The boy then “dumped” the girl in 2006 Then the woman told the girl “the world would be a better place without you.” The girl hung herself immediately after reading the message. Prosecutors say that the woman wanted to humiliate the girl for saying mean things to her daughter. They also said the woman knew that the 16 year old girl was suffering from depression and was emotionally fragile.

Class Discussion What was the crime? What should be the penalty if there was a crime? What should be done to prevent future incidents from occurring? Was this morally just?

The Outcome of Scenario This was considered the first trial of cyberbullying After the suicide Missouri passed a law against cyber- harassment. Similar federal legislation has been proposed on Capital Hill The woman was found guilty of three misdemeanor offenses of accessing computers without authorization. Each count is punishable by up to a year in prison and a $100,000 fine. The woman could have gotten 20 years if convicted of the four original charges.

Works Cited