Cybercrime What is it, what does it cost, & how is it regulated?

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Cyber X-Force-SMS alert system for threats.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
APA of Isfahan University of Technology In the name of God.
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
General Awareness Training
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Cyber crime & Security Prepared by : Rughani Zarana.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
CYBER CRIME.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
 Collecting Evidence ◦ Subpoenas, court orders, search warrants, electronic surveillance, and traditional methods You have to know where to look! Let’s.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Computer Skills and Applications Computer Security.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
CONTROLLING INFORMATION SYSTEMS
Security and Ethics Safeguards and Codes of Conduct.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Securing Information Systems
Done by… Hanoof Al-Khaldi Information Assurance
IT Security  .
Chapter 17 Risks, Security and Disaster Recovery
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
COMPUTER CRIME.
Securing Information Systems
Introduction to Computer Forensics
Forensic and Investigative Accounting
Forensic and Investigative Accounting
Presentation transcript:

Cybercrime What is it, what does it cost, & how is it regulated?

What is Cybercrime? Uses Computer & Internet to get between organizations/people & their money Estimates of 69% of all Internet activity involves criminal intent Low Risk Low Cost Online Communities sharing tips & tools

Costs of Cybercrime Estimates of FBI value damages to US at $400 billion in 2004 Virus attacks still the source of the greatest financial loss – 32% of all cybercrime losses reported

Net Fraud Users give up resources to online criminal Typically, the result of greed or unwariness on victim’s part Include bank fraud, online auctions, sales of goods purchased with stolen resources “Phishing” - fraudulent s appear to come from a familiar service provider wanting sensitive personal information

Unauthorized Access 4 Traditional Methods of Access Modem Attack – Unauthorized Modems Installed Software Bugs – Port Scanning Trusted Server – Zone Transfer (periodic updates) /IP Spoofing Social Engineering – Deceive Employee

Denial of Service Explicit attempt by attackers to prevent legitimate users of a service from using that service 3 Modes of Attack Consumption of scarce, limited, or non- renewable resources Destruction or alteration of configuration information Physical destruction or alteration of network components

Virus Attacks A program that runs on your computer system without your permission 3 Purposes for Virus Infection  Using your computer’s resources or information  Destroying your files  Disclosing files to others who aren't otherwise allowed to see them

Additional Cybercriminal Acts Spoofing – Misappropriation of another’s identity Bot (Computer Robot) Usage for searching without authorization Chaffing – Sending hidden messages across the internet Steganography – Hidden files inside digital photos or.wav files

International Law Currently no International Laws in place governing the world’s information technology 3 Options proposed by the United Nations seminar Self-regulating Market Market guided by National Authorities International Regime Regulation

Federal Regulation Federal Statute Title of CodeFocus of StatuteLoss Criteria 18 U.S.C Fraud and Related Activity in Connection With Access Devices Prevent use of counterfeit access devices to get account numbers, mobile ID, card, or PIN to steal funds or make fund transfers The theft must be for $1,000 or more during any one-year period. The loss includes the cost of responding to an offense, doing a damage assessment, restoring the system, revenue losses, cost incurred, or other damages because of an interruption of service 18 U.S.C Fraud and Related Activity in Connection With Computers Under the statute a “protected computer” is any PC attached to the Internet that is used to access files at financial institutions, the U.S. government, or a PC used in interstate commerce. A criminal act against a “protected computer” is the sending of code that causes damage, trafficking in passwords, threatening with the intent to commit extortion and/or accessing files without authorization or without proper authorization. Slight variation with the criminal activity, but is generally considered to be at $5,000 per year. The law also allows victims to bring civil actions against a perpetrator. 18 U.S.C Unlawful Access to Stored Communications Unauthorized access to an electronic communication service and the alternation of stored files. None listed Source: Journal of Forensic Accounting ©R.T. Edwards, Inc.

State Statutes Each state has enacted some legislation regarding computer related crime Most states added to existing property offense or criminal statutes. Legislation not limited to the cybercrime covered in this presentation Some additional crimes covered: cyber-stalking, crimes against children, spam

Knowledge, Skills, Abilities Build an Internet audit trail Collect “usable” courtroom electronic evidence Trace an unauthorized system user Ability to recommend or review security policies Current computer fraud techniques in use Ability to place valuation on incurred losses

More KSAs Understanding of information collectable from various computer logs Technical familiarity with the Internet, web servers, firewalls, attack methodology, security procedures & penetration testing Organizational & legal protocols for incident handling Established relationship with law enforcement

Additional Resources Invesigating and Prosecuting Network Intrusions, Smith, John Forensic Computing: A look at evidence And how to handle it, McCrone, John Computer Crime, Justice, Law and Society Computer Crime Research Center Free Data Recovery Tools