Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

New Communication Technologies in the Fight against Corruption Rebecca LI Assistant Director of Operations Independent Commission Against Corruption Hong.
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Information Warfare Theory of Information Warfare
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Computer Crime By FUNG Wai-keung Hong Kong Police.
Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.
CYBER CRIME AND SECURITY TRENDS
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
COMPUTER FORENSICS AND FORENSICS TECHNOLOGY BY MARI A. CHAN.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COEN 152 Computer Forensics Introduction to Computer Forensics.
General Awareness Training
Combating cyber-crime: the context Justice Canada March 2005.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
1 Developing and Implementing a CIRT Team Nanette S. Poulios, CISSP, CISM Senior Training Consultant Easy i.
LEFIS General Assembly, Wrocław Sept Continuing education Andrzej Adamski, Nicolaus Copernicus University, Poland.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Professional Development: Group 1 Career Topic COMPUTER FORENSICS.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Training and Certification. Who needs digital forensic training and professional certification? Forensic examiners Investigators Crime scene specialists.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
By: Megan Guild and Lauren Moore. Concept Map Mountain Stream Co. OS Active wear Computer Security Their Questions Details Examples Computer Forensics.
IPTS Workshop on Cyber Crime German Developments.
Chap1: Is there a Security Problem in Computing?.
Cybercrime What is it, what does it cost, & how is it regulated?
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Desktop Computer Start Animation.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Workshop 4 Tutor: William Yeoh School of Computer and Information Science Secure and High Integrity System (INFT 3002)
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Obtaining Support From Police Officers for Crime Prevention Programs Presented by American Crime Prevention Institute.
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Computer & Info Security Instructor: David Wilkeson, CISSP Class Website: Grades.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Securing Information Systems
Cyber Insurance Risk Transfer Alternatives
College of Adult & Professional Studies Criminal Justice Program
Introduction to Computer Forensics
Securing Information Systems
Forensic and Investigative Accounting
North Port Police Department Organizational Chart
Computers: Tools for an Information Age
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Counter Forensic for Computer Forensic By: Lara Amanj Gulan Azad.
Forensic and Investigative Accounting
Introduction to Digital Forensics
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau Computer Cirme Section Corporate Information Security and Law Enforcement in Hong Kong Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau Welcome The Computerised Litigation Support System also known as the CLSS My responsibilities in respect of the system are…..

Computer Crime Statistics in HK Computer Cirme Section Computer Crime Statistics in HK   Title of Offence 1999 2000 2001 (JAN-JUN) 1 Unauthorized Access to Computer by Telecommunication 238 53 13 2 Access to Computer with Criminal or Dishonest Intent 222 14 3 Criminal Damage (Website defacing, Denial of Service attack, etc.) 4 15 Obtaining Property by Deception (Internet Shopping Fraud, E-auction Fraud, etc.) 18 29 5 Theft (E-banking Related) 6 Others 57 49 24 Total 317 368 116  

Computer Cirme Section Computer-related Crime Theft of Corporate Data (copy, value, unauthorized access) Criminal Damage (encryption key management) Theft of Identity Social Engineering

Computer Cirme Section Corporate Information Security User Awareness and Education Escalation Procedures Investigation and Preservation of Digital Evidence Recovery (IT Crisis Management/Business Contingency Planning)

Computer Cirme Section Technology Crime Division Investigation (28605012/Corporate hotline?) Computer Forensics Liaison and Information Sharing (Crime Prevention) Seminars and Forums

Computer Cirme Section Future of Corporate Information Security Accreditation; training syllabus; professional exams Best Practices; International Standards Legal Requirements Competitive Advantages

Computer Cirme Section The End Welcome The Computerised Litigation Support System also known as the CLSS My responsibilities in respect of the system are…..