Computer Forensics and Crime Group 17 Lewis Hagen
Overview Computer Crime • Cybercrime • Types • How to Protect Yourself Computer Forensics • Business Study • Discussion
Computer Crime • Criminal activity where a computer or network is the source, tool, target, or place of a crime. • 2005 – Est. $10B in losses • A majority of computer crime goes unnoticed and is not reported. • Scale
Type of Computer Crimes • Malware/Malicious Code • Computer Virus • Unauthorized access to or modification of programs • Identity theft
Malware • Software designed to infiltrate or damage a computer system without the owner's informed consent. • It includes computer viruses, worms, trojan horses, spyware, dishonest adware, and other malicious and unwanted software.
Unauthorized access to or modification of programs • Hacker • someone involved in computer security/insecurity, specializing in the discovery of exploits in systems (for exploitation or prevention), or in obtaining or preventing unauthorized access to systems through skills, tactics and detailed knowledge
Identity Theft • Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. • Video
How to Protect Yourself • Anti-Virus Software • Norman Virus Control • Norton AntiVirus • McAfee VirusScan Do not open Do not open Suspicious Email ID Protection LifeLock
Computer Forensics • Computer forensics: also called cyberforensics, is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law.
Computer Forensics Steps • Identify sources of digital evidence • Preserve the evidence • Analyze the evidence • Present the findings When would It be used? • Employee internet abuse • Criminal fraud • Identity theft • Unauthorized disclosure of corporate information
Business Study • Disklabs • Global Company Established in 1997 • 'No matter what the computer crime, there will always be incriminating evidence.Computer Forensics will find it.' • Video
What Do you Think? • Do you think Your personal Information Is Safe? • Is It an invasion of your personal rights to have your Computer torn apart?
Where Did I find My information? • Wikipedia • Google • Information Week • Business Week • Disklabs Website • YouTube
Sources • I tried to use current sources when available • Reading #1- Computer Crime followed by **Cybercrime**,,3 March 2008. Reading #2- Searching and Seizing ComputersJuly 2002. Reading #3-FBI Computer Crime Survey18 January 2006 Reading # 4**Internet Crime Prevention Tips** Reading # 5- **An Explanation of Computer Forensics**
Sources I didn’t Use • These Articles were not Outdated and offered only a single narrow opinion. • www.computer-forensic.com/old_site/presentations/ASIS_Presentation.pdf • www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9047900&pageNumber=1
Computer Forensics and Crime • Questions??