Download presentation
Presentation is loading. Please wait.
Published byDuane Hutchinson Modified over 9 years ago
1
Chapter 5 Cyber Crime: Computer and Internet Fraud
2
Critical Thinking Exercise There are 5 different color houses, occupied by people of 5 different nationalities, who smoke 5 different cigar brands, drink 5 different types of alcohol, and have 5 different pets. The houses are lined up in a row. 1. The Brit lives in the red house. 2. The Swede keeps dogs as pets. 3. The Dane drinks tea. 4. The green house is on the left of the white house. 5. The green house’s owner drinks coffee. 6. The person who smokes Pall Mall rears birds. 7. The owner of the yellow house smokes Dunhill. 8. The man living in the center house drinks milk. 9. The Norwegian lives in the first house. 10. The man who smokes Blends lives next to the one who keeps cats. 11. The man who keeps the horse lives next to the man who smokes Dunhill. 12. The owner who smokes Bluemasters drinks beer. 13. The German smokes prince. 14. The Norwegian lives next to the blue house. 15. The man who smokes Blends has a neighbor who drinks water. QUESTION: WHO OWNS THE FISH?
3
3 Eras of Fraudulent Activities Paleolithic Era –Centered on cash and evading taxes –Fraud schemes involved alcohol, gambling, prostitution and drugs Neolithic Era –“Accountants could steal more than mobsters” –Included cash heavy business to conceal proceeds Geek-olithic Era –Computers or network of computers involved
4
Overview of Cyber Crime The Role of the Computers in Cyber Crime Computer Fraud vs. Computer Crime Losses or Other Damages Related to Computer Crimes International Aspects of Computer Crime
5
The Role of the Computers in Cyber Crime Computer Crime –Computer as an Object Computer or network is target –Computer as a Subject Computer is used to commit crime –Computer as a Tool Computer is integral to the act –Computer as a Symbol Computer adds credibility or is used to deceive
6
Computer Fraud vs. Computer Crime Computer Fraud –Access occurs with intent to execute a fraudulent scheme –Comprehensive Crime Control Act of 1984 –Computer Fraud and Abuse Act (CFAA) Computer Crime –Hardware, software or data is destroyed or manipulated due to acts which are not intended –Computer assisted crimes
7
Loss or Other Damages Related to Computer Crimes Economic Loss –Responding to illegal acts –Conducting a damage assessment –Restoring data or program to original condition –Consequential damages occurred Special Loss –An actual or potential effect on medical care –Physical injury to a person –Threat to public health or safety –Damage to a computer related to the administration of justice, national defense or national security
8
International Aspects of Computer Crime International dimensions are increasingly likely Securing electronic evidence is very difficult Complaints dropped, but losses have risen Council of Europe Cybercrime Convention
9
Frauds and Other Threats in the Digital World of Computers Insider Threats Computer Hacking –Social Engineering –Hacker Computer Manipulations Computer Viruses –Types of Computer Viruses –Virus Carriers and Indicators Hardware, Software and Data Security –Anti-Virus Software –Investigating Virus Infections
10
Insider Threats Computer crime from employees inside an organization –Opportunity to commit fraud –Aware of “holes” in the system Less stringent supervisory controls over IS personnel Computer fraudster characteristics are similar to traditional fraudster –Intelligent –Hard working –Minimal absences –Bored with “the routine” –Egotistical
11
Computer Hacking Seek unauthorized access to computer systems Incorporate unsuspecting computer owners Gain access by generating password
12
Social Engineering Simple deception to gain access to information Pose as new worker to gain information Retrieve documents from trash
13
Hacker Computer Manipulations Trojan Horse Trap Doors Salami Techniques Logic Bombs Data Diddling Scavenging and Dumpster Diving Data Leakage Piggybacking/Impersonation Simulation and Modeling Wire Tapping Network Weaving Altering Password Generation Buffer Overflow Exploits Privilege Escalation Exploits Backdoors HTTP Expoits Anti-Hacker Measures
14
Computer Viruses Attack Software Hidden computer programs that shut or slow down system Can ruin data and destroy computer Slow down can overload e-mail networks
15
Types of Computer Viruses Macro Virus “I Love You” virus Boot Sector Viruses Parasitic Viruses TSRAM Viruses Application Software Viruses Multi-Partite Viruses Polymorphic Viruses Stealth Viruses Mutation Engine Viruses Network Viruses Worms
16
Virus Carriers and Indicators CarriersIndicators Unknown applicationsSystem suddenly slows down Media brought in by employees Dramatic decrease in free space Unsolicited e-mailsIncrease in file size Vendors/suppliers with infected software Operating system begins behaving unpredictably
17
Hardware, Software and Data Security Effective security ensures availability of data Effective passwords are essential Logical controls to secure network Data encryption Digital signatures –E-SIGN Act Biometrics Smartcards Virus protection
18
Antivirus Software Detect computer viruses and malware Traditional Scanners –Look for known viruses –Check recognizable patterns –Limited usefulness Heuristic Scanners –Look for unknown viruses –Inspect executable files Behavior Blocking Scanners –Run continuously –Look for behavior linked to virus activity Change Detection Scanners –Check for changes
19
Investigating Virus Infections Virus infections can be investigated by taking the following actions –Isolate the system –Run antivirus software –Document findings Audit trail of infection Determine source of virus Protection policies Countermeasures Track costs / damages
20
Internet Fraud Electronic Commerce Typical Internet Schemes –Traditional Frauds Adapted for the Computer and Internet –Additional Threats and Abuses of the Computer and Internet Combating Internet Fraud
21
Electronic Commerce (E-Commerce) Electronic Signatures –Encryption –Smart Cards –Memory Cards –Processor Cards
22
Traditional Frauds Adapted for the Computer and Internet Get Rich Quick Pyramid Schemes Foreign Trusts Prime Bank Note Chain Letters Investment and Securities Fraud Ponzi Scheme
23
Additional Threats and Abuses of the Computer and Internet Modem Hijacking Spamming Counterfeit Check Scams Phishing Spear Phishing Pharming Internet Auction Fraud
24
Combating Internet Fraud Encrypt confidential information User validation Don’t store financial information and customer data on web server Firewalls –Attempt to prevent unauthorized access –Control interactions between servers and internet
25
Complex Frauds and Financial Crimes in Cyberspace Exploit computer vulnerabilities Hackers use malware to steal information “Botnets” Distributed Denial of Service (DDos) Why is internet an attractive operational location for criminal enterprises? –Information is power –Cyberspace gives criminal worldwide reach –World Wide Web is anonymous –Difficult to prosecute criminals
26
Shadowcrew: Web Mobs Sold stolen and counterfeit credit and identification cards $4 million in losses Can pop up anywhere and disband with little more than keystrokes Work solely in the online world
27
Money Laundering in Cyberspace Internet banking makes following money more difficult Enhanced by near anonymity Can be accessed by anywhere in the world Monitoring activity is nearly impossible Gambling of dirty money at cyber-casinos $500 billion annually Cyberspace payment models –Merchant Issuer Model –Bank Issuer Model –Non-Bank Issuer Model –Peer-to-Peer Model
28
Money Laundering in Cyberspace International Monetary Fund (IMF) World Bank Financial Sector Assessment Program (FSAP) Map Global Payment Systems Facilitate International Information Sharing –Information Sharing and Analysis Center (ISAC) Harmonize and Coordinate International Money Movement Regulations
29
E-gold Electronic currency –Backed by gold bullion in allocated storage –Global currency Can be used for money laundering –Anonymous –No records –No CTR’s –Circumvent regulated financial institutions
30
Reporting Cyber Crime, Computer and Internet Fraud Internet Crime Complaint Center (IC3) –Provides reporting mechanism for victims –Alerts authorities to suspected criminal or civil violations –Establish effective alliances with industry National White Collar Crime Center (NW3C) –Research internet related crime complaints
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.