Cybercrime and Cyberrelated Crimes Home. Background Cybercrime before networked computers Cybercrime before networked computers Hacker: now a pejorative.

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Cybercrimes and Cybercriminals There have been many stories in the media about computer crime. Sometimes hackers have been portrayed as “heroes” Perceptions.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Cybercrimes and Cybercriminals
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Chapter 14 Crime and Justice in the New Millennium
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Computer Security and Penetration Testing
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for.
Computer Forensics BACS 371
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
DIYTP What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity.
presentation topic : cyber crimes and security By ashwini awatare
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Computer Hacking Cybercrime (1).
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Computer Crime and CyberCrime Why we need Computer Forensics.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Cyber crime & Security Prepared by : Rughani Zarana.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
AVAR 2004, Japan, Tokyo Today’s Threats and the Evolution of the Computer Underground Today’s Threats and the Evolution of the Computer Underground Eugene.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Security Debate Why cracking should be criminalized.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Securing the Electronic Frontier Ch. 6 Reading: pp ; ; CS 340.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Chapter 17 Computer Crime Hess Introduction Computer crimes are relatively easy to commit and difficult to detect Most computer crimes are not prosecuted.
Seminar On Cyber Crime Submitted To: Submitted By:
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Securing Information Systems
Computer Crime and Security Measures
Chapter 13 Security and Ethical Challenges.
Forensic and Investigative Accounting
Introduction to Cybercrime and Security
Entering the World of Cybercrime
Laws Against Computer Hacking
Chapter 12 Technology and Crime: It’s a Double-Edged Sword
Presentation transcript:

Cybercrime and Cyberrelated Crimes Home

Background Cybercrime before networked computers Cybercrime before networked computers Hacker: now a pejorative term Hacker: now a pejorative term Computer fraud vs. computer abuse Computer fraud vs. computer abuse –Fraud: for gain –Abuse: for malice Unreported cybercrime Unreported cybercrime

Properties of a cybercriminal Are hackers cybercriminals? Are hackers cybercriminals? Precocity, curiosity, persistence Precocity, curiosity, persistence Amateur vs. professional Amateur vs. professional Motivation: greed? thrills? notoriety? Motivation: greed? thrills? notoriety? Crimes of opportunity? Crimes of opportunity?

Famous cybercriminals Kevin Mitnick Kevin Mitnick Robert Morris Robert Morris Onel de Guzman Onel de Guzman Mafia Boy Mafia Boy Dmitri Dmitri Curador Curador Cults Cults

Hacking vs. cracking Hacker: enthusiast Hacker: enthusiast Cracker: destructive hacker Cracker: destructive hacker White hat vs. black hat White hat vs. black hat General public unaware of distinction General public unaware of distinction Is all hacking criminal? Is all hacking criminal? Many IT leaders were hackers Many IT leaders were hackers

Hacking and the law Invasive activity, trespass, both, neither? Invasive activity, trespass, both, neither? Early legislation: no distinction between malicious vs. non-malicious hacking Early legislation: no distinction between malicious vs. non-malicious hacking Physical crime: distinction between trespass and theft or vandalism Physical crime: distinction between trespass and theft or vandalism Distinction not as clear for cyberspace Distinction not as clear for cyberspace

Cybercrime Mere use/presence of a computer does not make a crime a cybercrime Mere use/presence of a computer does not make a crime a cybercrime “A criminal act in which a computer is used as the principal tool.” “A criminal act in which a computer is used as the principal tool.” Computer as a central component Computer as a central component Cybercrime: can be committed only with computers Cybercrime: can be committed only with computers

Three Categories of Cybercrime 1. Cyberpiracy - using cyber-technology in unauthorized ways to: a. reproduce copies of proprietary software and proprietary information, or b. distribute proprietary information (in digital form) across a computer network. 2. Cybertrespass - using cyber-technology to gain or to exceed unauthorized access to: a. an individual's or an organization's computer system, or b. a password-protected Web site. 3. Cybervandalism - using cyber-technology to unleash one or more programs that: a. disrupt the transmission of electronic information across one or more computer networks, including the Internet, or b. destroy data resident in a computer or damage a computer system's resources, or both.

Figure 7-1: Cybercrimes and Cyberrelated Crimes Cybercrimes Cyberspecific Cyberpiracy Cybertrespass Cybervandalism Cyberrelated Crimes CyberexacerbatedCyberassisted Cyberstalking Internet Pedophilia Internet Pornography Income-tax cheating (with a computer) Physical assault with a computer Property damage using a computer hardware device (e.g., throwing a hardware device through a window)

Organized cybercrime Gambling, drug trafficking, racketeering Gambling, drug trafficking, racketeering Professionals: out for gain, more skilled, less likely to get caught Professionals: out for gain, more skilled, less likely to get caught Law enforcement: Law enforcement: –keystroke monitoring –Echelon –Entrapment –Patriot Act –Homeland Security Act

Corporate espionage Intercepted cell phone calls Intercepted cell phone calls Cybertech facilitates espionage Cybertech facilitates espionage Economic Espionage Act of 1996 Economic Espionage Act of 1996

International efforts Jurisdiction: “where” is crime committed? Jurisdiction: “where” is crime committed? On-line gambling example On-line gambling example Cyberspace: a place? a medium? Cyberspace: a place? a medium? ILOVEYOU: launched from Philippines, global effect, should Guzman be extradited? ILOVEYOU: launched from Philippines, global effect, should Guzman be extradited? Prosecution in multiple jurisdictions? Prosecution in multiple jurisdictions?

Legislation Patriot Act: Magic Lantern, vendor complicity Patriot Act: Magic Lantern, vendor complicity Back doors: potential for abuse Back doors: potential for abuse Technology changes too fast for law to keep up Technology changes too fast for law to keep up COE Convention on Cybercrime COE Convention on Cybercrime Danger! Don’t Click Here Home