1 / 28

Professional Practices COMPUTER CRIME

Professional Practices COMPUTER CRIME. Lecture 3 Syed Saqib Raza Rizvi. Preface. What is Computer Crime? General Types of Computer Crime Types of Computer Crime II Cyber Crime Statistics Preventions of Computer Crime Laws against Computer Crime. What is Computer Crime?.

rigg
Download Presentation

Professional Practices COMPUTER CRIME

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Professional PracticesCOMPUTER CRIME Lecture 3Syed Saqib Raza Rizvi

  2. Preface • What is Computer Crime? • General Types of Computer Crime • Types of Computer Crime II • Cyber Crime Statistics • Preventions of Computer Crime • Laws against Computer Crime

  3. What is Computer Crime? • Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. • The use of a computer to take or alter data, or to gain unlawful use of computers or services.

  4. Types of Computer Crime • Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. • Computer crimes also include the activities such as electronic frauds, misuse of devices, identify theft and data etc. • They rather include the manipulation of confidential data and critical information.

  5. General Types of Computer Crime: • As the Internet, mobile phones, and other computer technologies have flourished, criminals have found ways to use them for old-fashioned goals such as theft, fraud, and harassment etc.

  6. General Types of Computer Crime:1. Fraud • Most forms of Internet fraud are financial in nature • Cybercriminals may hack into personal financial accounts to access funds • Might attack website databases in order to gain access to consumer details, such as Social Security numbers, that can be used to take out credit cards or loans in another person’s name • This type of fraud is known as identity theft

  7. General Types of Computer Crime:2. Computer Trespassing • Cybercriminals can gain access to individual computers to peek through files, website browsing history, access passwords, or possibly even save files to your machine • This type of fraud is known as computer trespass • In many cases, computer trespassing is accomplished by luring people to click on attachments or download files.

  8. General Types of Computer Crime:3. Hardware Hijacking • Researchers at Columbia University recently discovered a serious security flaw in certain printers, as well. • Many printers automatically update their software when accepting a print job, connecting to the Internet to download the latest print drivers • Researchers believe that criminals could exploit this process by having printers download malicious files to trespass on networks the printers are connected to, or even to make the printers overheat and catch fire

  9. General Types of Computer Crime:4. Blackmailing, Harresment, Stalking • Several high-profile cases of teenagers bullying one another over the Internet • Bullies posted obscene or cruel messages to the victim on social media sites like Facebook, uploaded embarrassing videos • Information is often handed to the criminals by the victims themselves. • Unwary social media site users can give away their name, age, occupation, home and work addresses, or even their current location by using sites such as Foursquare or Facebook known as stalking

  10. General Types of Computer Crime:5. Spam • Unsolicited mass e-mail, known colloquially as “spam” • Spam messages can be used to trick people into giving up sensitive personal information phishing • As carriers for computer worms and viruses • Spam e-mail could leave you vulnerable to spoofing, where a spammer gains the ability to send more of this junk e-mail through your account

  11. General Types of Computer Crime:6. Information Warfare • More complex and far-reaching than the other crimes • Information warfare involves large-scale attacks on computers, websites, and networks. Jamming or hijacking a satellite or phone network • Hijacked computers can then be turned into zombies, spread malicious code, DDoS attack. • DDoS stands for “distributed denial of service”, and is basically the use of many computers to swamp a targeted website so that it cannot operate

  12. Cyber Crime Statistics • 25% cyber crime remain unresolved • 75 Million Scam Emails are sent every day claiming 2,000 victims •  73% of Americans have experienced some form of cyber crime and (65% globally) do the same. • 10.5% of the world’s Hackers from the UK • 66% of the world’s hackers are American 7.5% are Nigerian • Brazil suffers more than any other country with 83% of the population having suffered from internet crime • The Average Internet Crime will cost the Victim $ 128

  13. Top 15 Countries Originates Cyber Attack

  14. Common Types Of Cyber Attacks

  15. Prevention Of Computer Crime • Information Education (Ethics+Laws) • Adminstrating Information (Trained Persons) • Use of Protection from unauthorize access (Hardware+Software) • Punishing the Criminal (Implementing Laws)

  16. Possible Solution • Antivirus And Anti spyware Software • Firewalls • Cryptography • Cyber Ethics and Laws

  17. Computer Crime Laws • Computer Code and The First Amendment: Treated as same manner as stolen of other creative things like books, music, art etc 1993, the U.S. State Department ruled that Daniel Bernstein, then a graduate student at the University of California at Berkeley, would have to register as an international weapons dealer if he wanted to post an encryption program online.

  18. Computer Crime Laws • Computer Fraud and Abuse Act: The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. • accessing a computer without authorization and subsequently transmitting classified government information. [Subsection 1030(a)(1)]; • theft of financial information [Subsection 1030(a)(2)]; • accessing a "protected computer," which the courts have recently interpreted as being any computer connected to the internet, even if the intruder obtains no data [Subsection 1030(a)(3)]; • computer fraud [Subsection 1030(a)(4)]; • transmitting code that causes damage to a computer system [Subsection 1030(a)(5)]; • trafficking in computer passwords for the purpose of affecting interstate commerce or a government computer [Subsection 1030(a)(6)]; • and computer extortion [Subsection 1030(a)(7)].

  19. Computer Crime Laws • Electronic Communication Privacy Act: The Electronic Communications Privacy Act (ECPA) [18 U.S.C. Sections 2510-2521, 2701-2710], which was signed into law in 1986, amended the Federal Wiretap Act to account for the increasing amount of communications and data transferred and stored on computer systems. The ECPA protects against the unlawful interceptions of any wire communications.

  20. Computer Crime Laws • Other Federal Laws: There are other laws in the federal statutes that have been applied to hacker cases. These laws aren't designed specifically to counter computer crime, but have been applied to certain cases when existing law has proved inadequate in scope.

More Related