Chapter 5 Cyber Crime: Computer and Internet Fraud.

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Crime and Security in the Networked Economy Part 4.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Chapter 9: Privacy, Crime, and Security
Computer Viruses.
Internet Security Awareness Presenter: Royce Wilkerson.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber X-Force-SMS alert system for threats.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Threats and Attacks Principles of Information Security, 2nd Edition
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Cyber crime & Security Prepared by : Rughani Zarana.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Security in Computer System 491 CS-G(172) By Manesh T
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
Cybercrime What is it, what does it cost, & how is it regulated?
CONTROLLING INFORMATION SYSTEMS
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Securing Information Systems
IT Security  .
Chapter 11 crime and security in the networked economy
Clues 1 The Brit lives in the red house 2 The Swede keeps dogs as pets 3 The Dane drinks tea 4 As you look at the houses from across the street, the.
Solving the ‘Einstein” puzzle
Protect Your Computer Against Harmful Attacks!
Securing Information Systems
Cyber Crimes Chunlian QU 9/18/2018.
Security in Networking
Societal Issues in Computing (COMP466)
Chapter 9 E-Commerce Security and Fraud Protection
Computer Security.
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Chapter 5 Cyber Crime: Computer and Internet Fraud

Critical Thinking Exercise There are 5 different color houses, occupied by people of 5 different nationalities, who smoke 5 different cigar brands, drink 5 different types of alcohol, and have 5 different pets. The houses are lined up in a row. 1. The Brit lives in the red house. 2. The Swede keeps dogs as pets. 3. The Dane drinks tea. 4. The green house is on the left of the white house. 5. The green house’s owner drinks coffee. 6. The person who smokes Pall Mall rears birds. 7. The owner of the yellow house smokes Dunhill. 8. The man living in the center house drinks milk. 9. The Norwegian lives in the first house. 10. The man who smokes Blends lives next to the one who keeps cats. 11. The man who keeps the horse lives next to the man who smokes Dunhill. 12. The owner who smokes Bluemasters drinks beer. 13. The German smokes prince. 14. The Norwegian lives next to the blue house. 15. The man who smokes Blends has a neighbor who drinks water. QUESTION: WHO OWNS THE FISH?

3 Eras of Fraudulent Activities Paleolithic Era –Centered on cash and evading taxes –Fraud schemes involved alcohol, gambling, prostitution and drugs Neolithic Era –“Accountants could steal more than mobsters” –Included cash heavy business to conceal proceeds Geek-olithic Era –Computers or network of computers involved

Overview of Cyber Crime The Role of the Computers in Cyber Crime Computer Fraud vs. Computer Crime Losses or Other Damages Related to Computer Crimes International Aspects of Computer Crime

The Role of the Computers in Cyber Crime Computer Crime –Computer as an Object Computer or network is target –Computer as a Subject Computer is used to commit crime –Computer as a Tool Computer is integral to the act –Computer as a Symbol Computer adds credibility or is used to deceive

Computer Fraud vs. Computer Crime Computer Fraud –Access occurs with intent to execute a fraudulent scheme –Comprehensive Crime Control Act of 1984 –Computer Fraud and Abuse Act (CFAA) Computer Crime –Hardware, software or data is destroyed or manipulated due to acts which are not intended –Computer assisted crimes

Loss or Other Damages Related to Computer Crimes Economic Loss –Responding to illegal acts –Conducting a damage assessment –Restoring data or program to original condition –Consequential damages occurred Special Loss –An actual or potential effect on medical care –Physical injury to a person –Threat to public health or safety –Damage to a computer related to the administration of justice, national defense or national security

International Aspects of Computer Crime International dimensions are increasingly likely Securing electronic evidence is very difficult Complaints dropped, but losses have risen Council of Europe Cybercrime Convention

Frauds and Other Threats in the Digital World of Computers Insider Threats Computer Hacking –Social Engineering –Hacker Computer Manipulations Computer Viruses –Types of Computer Viruses –Virus Carriers and Indicators Hardware, Software and Data Security –Anti-Virus Software –Investigating Virus Infections

Insider Threats Computer crime from employees inside an organization –Opportunity to commit fraud –Aware of “holes” in the system Less stringent supervisory controls over IS personnel Computer fraudster characteristics are similar to traditional fraudster –Intelligent –Hard working –Minimal absences –Bored with “the routine” –Egotistical

Computer Hacking Seek unauthorized access to computer systems Incorporate unsuspecting computer owners Gain access by generating password

Social Engineering Simple deception to gain access to information Pose as new worker to gain information Retrieve documents from trash

Hacker Computer Manipulations Trojan Horse Trap Doors Salami Techniques Logic Bombs Data Diddling Scavenging and Dumpster Diving Data Leakage Piggybacking/Impersonation Simulation and Modeling Wire Tapping Network Weaving Altering Password Generation Buffer Overflow Exploits Privilege Escalation Exploits Backdoors HTTP Expoits Anti-Hacker Measures

Computer Viruses Attack Software Hidden computer programs that shut or slow down system Can ruin data and destroy computer Slow down can overload networks

Types of Computer Viruses Macro Virus “I Love You” virus Boot Sector Viruses Parasitic Viruses TSRAM Viruses Application Software Viruses Multi-Partite Viruses Polymorphic Viruses Stealth Viruses Mutation Engine Viruses Network Viruses Worms

Virus Carriers and Indicators CarriersIndicators Unknown applicationsSystem suddenly slows down Media brought in by employees Dramatic decrease in free space Unsolicited sIncrease in file size Vendors/suppliers with infected software Operating system begins behaving unpredictably

Hardware, Software and Data Security Effective security ensures availability of data Effective passwords are essential Logical controls to secure network Data encryption Digital signatures –E-SIGN Act Biometrics Smartcards Virus protection

Antivirus Software Detect computer viruses and malware Traditional Scanners –Look for known viruses –Check recognizable patterns –Limited usefulness Heuristic Scanners –Look for unknown viruses –Inspect executable files Behavior Blocking Scanners –Run continuously –Look for behavior linked to virus activity Change Detection Scanners –Check for changes

Investigating Virus Infections Virus infections can be investigated by taking the following actions –Isolate the system –Run antivirus software –Document findings Audit trail of infection Determine source of virus Protection policies Countermeasures Track costs / damages

Internet Fraud Electronic Commerce Typical Internet Schemes –Traditional Frauds Adapted for the Computer and Internet –Additional Threats and Abuses of the Computer and Internet Combating Internet Fraud

Electronic Commerce (E-Commerce) Electronic Signatures –Encryption –Smart Cards –Memory Cards –Processor Cards

Traditional Frauds Adapted for the Computer and Internet Get Rich Quick Pyramid Schemes Foreign Trusts Prime Bank Note Chain Letters Investment and Securities Fraud Ponzi Scheme

Additional Threats and Abuses of the Computer and Internet Modem Hijacking Spamming Counterfeit Check Scams Phishing Spear Phishing Pharming Internet Auction Fraud

Combating Internet Fraud Encrypt confidential information User validation Don’t store financial information and customer data on web server Firewalls –Attempt to prevent unauthorized access –Control interactions between servers and internet

Complex Frauds and Financial Crimes in Cyberspace Exploit computer vulnerabilities Hackers use malware to steal information “Botnets” Distributed Denial of Service (DDos) Why is internet an attractive operational location for criminal enterprises? –Information is power –Cyberspace gives criminal worldwide reach –World Wide Web is anonymous –Difficult to prosecute criminals

Shadowcrew: Web Mobs Sold stolen and counterfeit credit and identification cards $4 million in losses Can pop up anywhere and disband with little more than keystrokes Work solely in the online world

Money Laundering in Cyberspace Internet banking makes following money more difficult Enhanced by near anonymity Can be accessed by anywhere in the world Monitoring activity is nearly impossible Gambling of dirty money at cyber-casinos $500 billion annually Cyberspace payment models –Merchant Issuer Model –Bank Issuer Model –Non-Bank Issuer Model –Peer-to-Peer Model

Money Laundering in Cyberspace International Monetary Fund (IMF) World Bank Financial Sector Assessment Program (FSAP) Map Global Payment Systems Facilitate International Information Sharing –Information Sharing and Analysis Center (ISAC) Harmonize and Coordinate International Money Movement Regulations

E-gold Electronic currency –Backed by gold bullion in allocated storage –Global currency Can be used for money laundering –Anonymous –No records –No CTR’s –Circumvent regulated financial institutions

Reporting Cyber Crime, Computer and Internet Fraud Internet Crime Complaint Center (IC3) –Provides reporting mechanism for victims –Alerts authorities to suspected criminal or civil violations –Establish effective alliances with industry National White Collar Crime Center (NW3C) –Research internet related crime complaints