Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Electronic Crimes on the E-Information Highway. Violent Crimes.
By Andy Scott, Michael Murray and Adam Kanopa
How to protect yourself, your computer, and others on the internet
Introduction and Overview of Digital Crime and Digital Terrorism
Coxheath Primary School E-safety- Term Purpose To outline the use of the internet in school The use of the internet outside school What are the.
The Internet.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
CYBER CRIME AND SECURITY TRENDS
Company LOGO Internet Safety A Community Approach.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Chapter 11 Security and Privacy: Computers and the Internet.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Digital Citizenship By: Miranda Scorver.
Are Your Equipped to Fight Against Cyber Sharks of Internet to Protect your Kids?
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Unethical use of Computers and Networks
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Digital Citizenship Project By Allen Naylor Ed 505.
Security and Ethics Privacy Employment Health Crime Working
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
INTERNET: The Good, The Bad and The Ugly
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Get Safe Online Expert advice for everyone In association with.
Web Page Design and Development I Standards Standard A Safety and Ethics – 3 Identify potential abuse and unethical uses of computers and networks.
Cybercrime What is it, what does it cost, & how is it regulated?
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Technology: Friend or Foe? Thinking about Information Ethics.
Computer crimes.
Privacy, Security and Ethics
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Security, Social and Legal Issues Regarding Software and Internet
GCSE ICT SECURITY THREATS.
IT Security  .
A Project on CYBER SECURITY
COMPUTER CRIME.
Presentation transcript:

Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi

Outline Internet Fraud Identity Theft Computer Intrusion (i.e. Hacking) Internet Security Child Exploitation Digital Media Piracy

Introduction With the introduction of the internet, new technologically advanced crimes have evolved from old crimes. A closer look Crimes include Fraud, Child pornography, Phishing, Spam, Cyber stalking, Denial of service and Hacking. Internet popularity An opportunity for criminals to turn technology into a tool of crime and abuse. Internet anonymity Difficult and sometimes almost impossible to detect criminals.

Internet Fraud What does it mean? Fraud scheme that utilizes the various internet facilities to present and commit fraudulent activities. What are the major types? Business-opportunity/work-at home schemes, Auction & Retail schemes online, Identity theft, Investment schemes, Credit card schemes, Advance fee fraud.

Identity theft A current growing crime, causing individuals and governments a fortune. Annual cost to victims in the US is about $5 million. Costs the UK economy £1.3billion in 2002 (cabinet office figures 2003)

How identities are stolen Your identity can be obtained through Bin raiding, phishing, Shoulder-surfing, Skimming cards, Spoof letters, lottery frauds etc. How is it used? Check fraud, credit card fraud, mortgage fraud, and other financial crimes. To enable terrorism, illegal immigration, obtain medical help and evade criminal prosecution.

Tips on prevention Can you protect yourself? Yes, Dont easily give away your data Destroy documents bearing your personal Information Keep your important documents in a safe place. Treat your credit cards as if they are cash

Computer Intrusion (i.e. Hacking) Three Types of offence Hacking -- breaking into computer systems without authorization Cracking -- breaking or removing copy- protection on software Phreaking -- exploring communications (e.g. telephone) networks to gain free access, calls or information

Hacking: types of attack Viruses - most common form of attack Denial of Service attacks (DoS & DDoS)DoS DDoS Trojans (or Trojan horses)Trojans Brute-Force and `Social Engineering' Password attacksBrute-Force Port scanning and spoofing Phishing

Loss caused by Hacking Interest Harmed: Confidentiality Integrity Availability Financial loss Computer crime cases Computer crime cases Target: Private Public Threats to public health or safety

Internet Security Three areas of Internet security: Physical Security Data Security Server & Software Security Three aspects of data protection: Privacy Integrity Authenticity

Legislation Objective: Protecting personal data Promoting better access to public data Acts: Computer Misuse Act 1990 Data Protection Act 1998 Freedom of Information Act 2000

To be hacked or not to be, Its a question! Acknowledgement My brave Laptop…

Child Exploitation On the Internet How much access should children have on the Internet?

Child Exploitation : This can be described as the sexual exploitation of children through possession, distribution of child pornographic materials, and child trafficking. Paedophile : A child sexual abuser. Definitions Child A young person below the age of 18 years. A person between birth and puberty who has not attained maturity.

Child Exploitation Online The Internet has been of tremendous benefit for the child in learning and development. Internet has become a medium for child maltreatment, sexual and emotional abuse, exposure to offensive material. Paedophiles use a technique known as online grooming to lure children into child pornography.

Online Paedophile Presence - Prominence on the Web In the U.K, The W0nderland Club Membership was granted when an individual could provide 10,000 pictures of children being sexually abused that would then be circulated to members worldwide. In the U.S, The North American Men/Boy Love Association (NAMBLA) Their goal: To end the extreme oppression of men and boys in mutually consensual relationships by building understanding and support for such relationships and educating the general public on the benevolent nature of man/boy love (NAMBLA, 2001).

Child Predators Use the Internet…… 1. Provides easy access to victims i.e. children. 2.Internet provides anonymity in identity. 3.Easy access to private details. e.g. phone no 4. Internet chat rooms provides avenue for grooming activity. 5. Children divulge sensitive information easily through chat rooms. 6. Easy duplication and distribution of inappropriate / pornographic materials.

Preventive Measures for Child Safety Online 1.Keep user names & profiles generic and anonymous. 2. Avoid posting personal photos online. 3.Keep private information private. 4. Keep computer in open area. 5. Remind children that unknown online friends are strangers. 6. Be a part of your childs online experience. 7. Be aware of phone calls, chat messages, mails sent by your child.

Child Safety Online – Everyones Responsibility Govt Provide virtual police services that empower children to report crime, restricting child access to unprotected sites. Parents Monitor, supervise child surfing activity on the internet. Online Communities Outreaches to empower students, teachers, parents, and adults to safeguard the childs online experience. Development of watch dog organisations for online safety, software to safeguard children online.

Digital Media Piracy Piracy is an illegal theft or reproduction of creative works by owners of intellectual property. For distributors and retailers, the people who sell or rent out legitimate CDs, DVDs, the increased availability of pirate copies is a major threat to their businesses. Pirate profiteering doesn't just affect big businesses but everyone whose livelihood relies on sales of legitimate product - from technicians to retail staff; script writers to independent shop keepers.

Producers, songwriters, artists, distributors, and retailers make huge losses annually due to piracy. Latest figures by the Recording Industry Association of America (RIAA) gives a total loss estimate of $ 4.2 billion worldwide each year in the recording industry. "Copyright" is a term of intellectual property law that prohibits the unauthorized duplication, adaptation or distribution of a creative work. Drawbacks on Music/Movie Producers Battle Against Piracy Consumer resistance to stop illegal download of digital media. Proliferation of File Sharing and P2P Networks For Music. Issues on consumer rights to distribution of digital media purchased.

Copyright Laws & Penalties for Infringement ACTS 1.Digital Millennium Copyright Act of The U.S. No Electronic Theft Law (NET Act) – U.S. Copyright Law PENALTIES Under Criminal Cases Sound recording infringements is Punishable by up to: 5yrs in prison + $250,000 in fine 10yrs in prison (repeat offenders) Online infringement is punishable up to: 3yrs in prison + $250,000 in fine 6yrs in prison (repeat offenders) Under Civil Cases Individuals can be held liable for damages or lost profits up to: $150,000 per work infringed.

Conclusion The growing trend and sophistication of internet and identity theft frauds, suggests that increased technology and social awareness should also be enhanced if they are to be controlled. Hacking will always exits, but with proper preventive controls, legislation, and technology, the risk can be mitigated. A child should be given restricted access to the internet, ideally on a need to know basis, and must be empowered to guarantee a safe online experience. The Battle against Piracy will continue to be a Rat Race if the motivation behind the fight against piracy is based on personal gains or financial rewards.

ANY QUESTIONS?

BACK

Next

BACK

Back