L o g o Types of Computer Crime Zhuravlev Alexander 326 MSLU.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Section C Threats to Data.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
Computer Threats I can understand computer threats and how to protect myself from these threats.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Cyber X-Force-SMS alert system for threats.
Threats To A Computer Network
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
An Introduction to Phishing and Viruses
IT Security  .
A Project on CYBER SECURITY
COMPUTER CRIME.
Lesson 2- Protecting Yourself Online
Computer Security.
Computer Security.
Lesson 2- Protecting Yourself Online
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

L o g o Types of Computer Crime Zhuravlev Alexander 326 MSLU

L o g o COMPUTER-RELATED CRIME Computer crimes refer to the use of information technology for illegal purposes or for unauthorized access of a computer system where the intent is to damage, delete or alter the data present in the computer. Even identity thefts, misusing devices or electronic frauds are considered to be computer crimes.

L o g o Background The increasing range of programmable electronic devices, from set-top TV boxes to mobile phones, means that ‘computer’ crime can affect more than just personal computers (PCs). They and other electronic devices are particularly vulnerable to attack because they are flexible, can be reprogrammed, and are frequently networked with other devices. There are two main ways by which computers can be involved in crime:

L o g o Background Old crimes conducted using computers as a tool: for example storage of illegal images on a hard disk instead of in print, harassment using mobile telephones. Another example is ‘phishing’ New types of crime made possible by specific technologies. One example is denial of service attacks or DoS which prevent computer resources being available to intended users, for example by flooding web servers with more data than they can process. This was done in 2004 by a Russian crime gang in an extortion attempt on UK gambling websites during the 2004 Grand National. The National High Tech Crime Unit (NHTCU) acted with Russian authorities to arrest those responsible

L o g o Types of computer–related crime Hacking: The act of defeating the security capabilities of a computer system in order to obtain an illegal access to the information stored on the computer system is called hacking. Another highly dangerous computer crime is the hacking of IP addresses in order to transact with a false identity, thus remaining anonymous while carrying out the criminal activities. Kevin Mitnick was a famous hacker for supposedly hacking into NORAD (the pentagon), though he claims he only looked at minor things such as Nokia and Motorola Vladimir Levin is famous because he allegedly masterminded the Russian hacker gang that tricked Citibank's computers into spitting out $10 million. He was sentenced to three years in prison and ordered to pay Citibank $240,015 (his share from the heist). Citibank has since begun using the Dynamic Encryption Card, a security system so tight that no other financial institution in the world has it

L o g o Types of computer–related crime Phishing : Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source. Phishing is carried out through s or by luring the users to enter personal information through fake websites. Criminals often use websites that have a look and feel of some popular website, which makes the users feel safe to enter their details there Attacks are increasing, with financial services accounting for over 93% of impersonated or hijacked brands through bogus websites and s. Almost all of the UK’s high street banks have been affected by phishing.

L o g o Types of computer–related crime Computer Viruses : These are actually computer programs that are capable of replicating themselves and harming computer systems present in a network. These viruses work without the knowledge of the users and spread from one computer to another through the network, Internet or removable devices like CDs and USB drives. Writing computer virus is a criminal activity and is punishable by law. Virus detections The list of viruses includes all detections, including worms, trojans, and tracking cookies. Love Letter The fastest spreading virus in history appears to have been written by a resident of Manila in the Philippines. Sent via in May 2000 with "I LOVE YOU" in the subject field, it replicated itself to everyone in the user's Outlook address book and then destroyed local files. Love Letter forced numerous organizations to shut down their systems, as computer users were far too willing to let love into their lives.

L o g o Types of computer–related crime Identity Theft : This one of the most serious frauds in today's word. It involves stealing money and getting benefits by using an identity of another person. This also includes the use of someone else's credit card details to purchase good and services. It has been seen that blackmail and terrorism often employ identity theft. Albert Gonzalez of Miami, 28, is charged with acting with two unnamed conspirators to locate large corporations and steal vital account information in a crime that the Department of Justice calls "the single largest hacking and identity theft case ever prosecuted." Authorities say more than 130 million credit and debit card numbers were stolen in a corporate data breach involving three different corporations and two individuals Albert Gonzalez of Miami, 28, is charged with acting with two unnamed conspirators to locate large corporations and steal vital account information in a crime that the Department of Justice calls "the single largest hacking and identity theft case ever prosecuted." Authorities say more than 130 million credit and debit card numbers were stolen in a corporate data breach involving three different corporations and two individuals

L o g o Types of computer–related crime Cyberstalking : This is using the Internet to stalk a person just like someone world do in the real world. Here the stalker sends s, spreads false information or issues threats using the Internet. Cyberstalkers often target the users by means of chat rooms, online forums and social networking websites to gather user information and harass the users on the basis of the information gathered. A 44 year old publishing executive named Claire Miller was harassed by strangers who were responding to verging-on-pornographic promises someone had made in her name online. These postings included her home address and telephone number.

L o g o User awareness There is limited awareness of computer security among home as well as business users. Inadequately protected computers can be easy targets for unauthorised users. ‘Get Safe Online’ is a joint Government-industry initiative to provide computer security advice. Get Safe Online The Government–industry partnership education initiative ‘Get Safe Online’ is the first national internet-based computer security awareness campaign for the general public and small businesses. The ‘Get Safe Online’ website has 13,000 websites which are linked to it. It provides information to individuals on how to protect themselves, their families or their business from online threats. Get Safe Online The Government–industry partnership education initiative ‘Get Safe Online’ is the first national internet-based computer security awareness campaign for the general public and small businesses. The ‘Get Safe Online’ website has 13,000 websites which are linked to it. It provides information to individuals on how to protect themselves, their families or their business from online threats.

L o g o Zhuravlev Alexander # 326 MSLU 2009