The University of Hull Centre For Internet Computing Spam ‘n’ chips A discussion of internet crime Angus M. Marshall BSc CEng MBCS FRSA.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

2 Language of Computer Crime Investigation
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Breaking Trust On The Internet
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Prepared by: Nahed Al-Salah
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Cyber X-Force-SMS alert system for threats.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Computer Networks IGCSE ICT Section 4.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
ICT Essential Skills. (electronic mail) Snail Mail.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Chapter 11 Security and Privacy: Computers and the Internet.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Cyber Crimes.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
Lecturer: Ghadah Aldehim
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Crime & Malpractice AS Module Heathcote Ch. 10.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Types of Electronic Infection
Promotion of e-Commerce sites. A business which uses e- commerce to trade online must also advertise. Several traditional methods can be used, such as.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
IT in Business Issues in Information Technology Lecture – 13.
Topic 5: Basic Security.
MSBCS-BCSI-1 Students will identify computer system components MSBCS-BCSIII-8 Students will examine basics of networking Computer Basics & Terminology.
What is a spam? w abuse-faq/spam-faq.html w Spam is flooding the Internet with many copies of the same message,
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
ICT & Crime Introduction. Homework read THREE stories from ict.com/news/news_stories/news_crime.htm & produce a 3-fold leaflet describing/discussing.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
THE LARGEST NAME SERVICE ACTING AS A PHONE BOOK FOR THE INTERNET The Domain Name System click here to next page 1.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Fourth Grade Home Directory/H-Drive The location on the server where individual users can save their work. This directory is named the same as the username.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
TMG Client Protection 6NPS – Session 7.
3.6 Fundamentals of cyber security
Threats to computers Andrew Cormack UKERNA.
Understand Internet Search Tools
Section 14.1 Section 14.2 Identify the technical needs of a Web server
A Distributed DoS in Action
1.01- Understand Internet search tools and methods.
1.01- Understand Internet search tools and methods.
ONLINE SECURE DATA SERVICE
1.01- Understand Internet search tools and methods.
1.01- Understand Internet search tools and methods.
Presentation transcript:

The University of Hull Centre For Internet Computing Spam ‘n’ chips A discussion of internet crime Angus M. Marshall BSc CEng MBCS FRSA

The University of Hull Centre For Internet Computing Topics Context Cybercrime & Classifications Non-internet crime Internet crimes Challenges Intelligence Aspects Conclusion

The University of Hull Centre For Internet Computing Context Growth in –Computer use –Internet use New opportunities for use and abuse

The University of Hull Centre For Internet Computing Cybercrime Broad categories Computer crime Internet “crime” Excludes –Crimes involving technology where the technology is incidental e.g. theft of computer systems for parts etc.

The University of Hull Centre For Internet Computing Classification Examples

The University of Hull Centre For Internet Computing Case study - Computer Assisted Blackmail evidence recovery –evidence on hard disk of suspect’s PC –forensic examination using approved tools yielded partial copies of deleted files –analysis of printed material linked it to suspect’s printer

The University of Hull Centre For Internet Computing Internet crimes “those which involve the use of the Internet to commission crime, or directly affect the performance of some service on the Internet”

The University of Hull Centre For Internet Computing Why internet crime ? Internet is a tool –communications channel –service delivery channel Cheap Mostly reliable Worldwide

The University of Hull Centre For Internet Computing Case study - Internet Assisted Manual web page defacement –‘hacker’ changes content of a WWW site –could be achieved by breaking into the site and using the host computer

The University of Hull Centre For Internet Computing Case study - Internet enabled –Money laundering (Credit Card) ‘adult oriented’ material provider operates franchise & referrer scheme criminal obtains credit card numbers criminal purchases licenses for material uses WWW to resell material and refer customers to original provider additional - not all referred customers are human!

The University of Hull Centre For Internet Computing Internet only crime - a challenge Define “crime” for the Internet. –Legislation lags technology –Locality of offence Current definitions –“frontier law” based on AUP/ToS and “gentlemen’s agreements”

The University of Hull Centre For Internet Computing Internet Intelligence Source –Search engines, directories, WWW pages, newsgroup archives etc. Generator –Transmission information, server logging, ARP tables, routing tables

The University of Hull Centre For Internet Computing Challenge Transient data –may only exist for a few minutes Distributed data –worldwide, multiple nodes Volumes –1 WWW page request = –150+ characters logged

The University of Hull Centre For Internet Computing Case study - Internet only Automated WWW page defacement –“Code Red” / “Nimda” –virus infects server –searches for other servers to infect –attacks at random –replicates itself to the new target and starts again

The University of Hull Centre For Internet Computing Evidence generated As the virus probes across the network it leaves –semi-permanent entries in server logs –transient entries in routers –transient entries in other tables

The University of Hull Centre For Internet Computing Intelligence Aspect Combining this information can tell us –where the infestation is –where it may strike next –what it is.

The University of Hull Centre For Internet Computing Conclusion Internet is valuable as both source and generator BUT there is too much generated information we need better tools to automate the analysis and provide better intelligence.

The University of Hull Centre For Internet Computing Why “Spam ‘n’ Chips ?” Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sendersender.