SlideShare ist ein Scribd-Unternehmen logo
1 von 67
Computer Crime Scope of the problem
Computer Crime: Background ,[object Object],[object Object]
Computer Crime: Background The accounting firm of Ernst & Young estimates that computer-related crime cost U.S. businesses about $3 billion to $5 billion a year in losses. Other researchers put the total loss figure as high as $40 billion if losses from Viruses and Software Piracy are included.
Computer Crime: Background Only 6% to 11% of computer crime is reported. Of this segment, only 2% of the cases resulted in a conviction requiring any jail time. Less than a dozen computer criminals nationwide have served any time.
Computer Crime: Background Average insured losses resulting from exploitation and tampering of computer systems are in the range of $500,000 - $600,000.
Computer Crime: Background 75% to 80% of all computer crime is traceable to trusted insiders who had legitimate computer access, and/or knowledge of how operational procedures could be manipulated to their financial benefit.
Computer Crime: Background Key motivational factors driving insider actions are: - lax security - revenge aimed at management.
Computer Crime: Background Average bank robber: $5K / 90% / 7 yrs hard time vs. Computer criminal: $600K / 2%/ 2 yrs min. security
Computer Crime: Background Normal computer crime takes less than one second to pull off, and is usually done from  another state or foreign country.
Computer Crime: Background A 1989 study by the National Center for Computer Crime Data of 3,500 companies found an average loss of $110,000, 365 man-hours, and 26 hours of computer time for each computer crime event discovered. 70% of all events involved theft of money or services.
Computer Crime: Background When a computer criminal is caught, it is "because such a large sum of money is taken that even the most ill-prepared system will note the anomaly."   (Donn Parker. SRI computer crime expert)
Computer Crime: Background "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than a bomb." "To date, we have been remarkably lucky... Unfortunately, there is reason to believe that our luck will soon run out."
Computer Crime: Background "The committee is concerned that the development of legislation and case law is being outpaced by the growth of technology and changes in our society."  (Source: Computers At Risk, National Research Council, 1991)
Computer Crime: Insider Examples Stanley Mark Rifkin hits Security Pacific Bank for  $10.2 million using EFT passwords he observed pasted to terminals in the money transfer room of the bank. ('78)
Computer Crime: Insider Examples A New York brokerage firm disables the audit trail on their computer system to speed up operations. Shortly after, a clerk disappears to Switzerland with an estimated $28.8 million. ('86)
Computer Crime: Insider Examples The computer program that Volkswagen of West Germany used to control its international finance operations was altered so that 5 high-level executives got away with $260 million. No charges filed, but all fired! ('87)
Computer Crime: Insider Examples A London bank releases a press statement claiming their banks are not vulnerable to fraud the same day 4 persons are arrested with 1,864 valid, but forged, ATM cards in their possession. ('87)
Computer Crime: Insider Examples  Seven New York men use stolen EFT codes to  embezzle S70 million from the bank accounts of  Merrill-Lynch and United Airlines. They are caught only after they cause Merrill-Lynch's account to be overdrawn. ('88)
Computer Crime: Insider Examples A Delaware state lottery computer system  malfunctions, allowing unscrupulous lottery vendors to help themselves to $555,000 in winning tickets after the numbers had already been drawn. ('89)
Computer Crime: Insider Examples The Washington State prison system suspends a  program where inmates were allowed to keep PCs in their cells, citing security issues after one prison's main computer system experienced unusual problems. ('89)
Computer Crime: Insider Examples 18 inmates working as data entry operators at the Tennessee State Prison guess the password to a payroll system and give themselves raises ranging from $20 to $500 a month. ('90)
Computer Crime: Insider Examples U.S. Attorney's Office in Kentucky sells computer at surplus auction for $45, and then realizes that 7 years worth of data on Federal Agents and Witness Protection participants were not erased. ('90)
Computer Crime: Insider Examples Laptop computer is stolen from Wing Commander of British military. On the laptop were classified plans for Persian Gulf war. Returned 4 days later in the mail. ('91)
Computer Crime: Insider Examples Four Cal Poly University students are arrested after charging $250,000 in goods to MasterCard and Visa cards. They gained access to Equifax, and copied some 1,600 credit reports. They then used the good credit-card numbers to re-program the magnetic data on stolen credit cards. They did this from a laptop in their car. ('91)
Computer Crime: Hacker History ,[object Object],[object Object],[object Object]
Computer Crime: Hacker History ,[object Object],[object Object],[object Object]
Computer Crime: Hacker Profile Profile of a typical hacker is a white or Asian male,  age 14 to 20, with average to below-average grades, an introvert who does not relate well to even his peers, has no father in the home, and has a personal life that is severely disorganized.
Computer Crime: Hacker Profile Hackers will spend 200 to 300 hours a month on the phone exchanging messages with other hackers, as well as trying to gain entry to computer systems world wide.
Computer Crime: Malicious Hackers AF-OSI nabs 14 year old for hacking into computers at the Pentagon and downloading several unclassified documents. Use of an "800" number allowed him to be traced. ('89)
Computer Crime: Malicious Hackers Kevin Mitnick, the "Darth Vader of Hackers,"  hacks into DEC and copies the security software (loss, $4 million) they use to protect their systems. When arrested, he had 16 stolen MCI codes in his possession. He also shut down 911 service in California ('89)
Computer Crime: Malicious Hackers  Republican Party staff member from New Jersey hacks into the Democratic Party computer system and copies confidential files. Files showed that state workers were using state time for campaign work. ('90)
Computer Crime: Malicious Hackers The Legion of Doom is credited with planting a virus in the AT&T Switching Network. The system was down for 9 hours. 25 million long distance phone calls get busy signal.  (Jan 15, 1990 - MLK holiday)
Computer Crime: Malicious Hackers Johnson Space Center denies it has lost $12 million over two years due to abuse of their phone system. One stolen access code was distributed to hundreds of hackers. ('90)
Computer Crime: Malicious Hackers Leslie Lynne Douchette (AKA, Kyrie), ring-leader of nationwide group of hackers, is sentenced to 27 months. Losses directly tied to her pivot on 481 MCI access codes in her possession that accounted for S595,000 in long-distance phone fraud. ('90)
Computer Crime: Malicious Hackers "Hacker Heaven": Belgium, Greece, Italy and the Netherlands. As of August 1991, they had no laws that made unauthorized access/tampering of computers a crime.
Computer Crime: Malicious Hackers U.S. vendor of secure modems issues challenge to hackers: "Hack into my system and I will give you cash reward." 8,000 hackers tried. ('91)
Computer Crime: Viruses & Worms ,[object Object],[object Object]
Computer Crime: Viruses & Worms The goal of both viruses and worms is to replicate themselves. They may, or may-not trigger on some external event that causes them to be annoying or destructive.
Computer Crime: Viruses & Worms ,[object Object],[object Object]
Computer Crime: Viruses & Worms The public attitude toward viruses is changing. They are now seen as a bizarre form of industrial sabotage, rather than a technological version of a practical joke.
Computer Crime: Viruses & Worms "Christmas Tree" virus forces IBM to shut down 350,000 internal communications networks world- wide for nearly three days to permit location and removal of the virus. ('87)
Computer Crime: Viruses & Worms The Internet Unix worm, written by Robert Morris, caused 6,200 computer systems to crash, it took 1 million hours to repair the damage, at an estimated cost of $97 million.
Computer Crime: Viruses & Worms Convicted, Morris could have gotten five years and a $250,000 fine, but instead a U.S. District Court Judge gave him  400 hours  of community service, a  $10,000 fine  and  3 years probation . ('88)
Computer Crime: Viruses & Worms ,[object Object],[object Object]
Computer Crime: Viruses & Worms One of the most common viruses, the "Friday the 13th," was written by a programmer in the Middle East as a protest against the 40-year anniversary of the founding of Israel.
Computer Crime: Pedophiles ,[object Object],[object Object],[object Object]
Computer Crime: Pedophiles Medford, Massachusetts Police raided a child pornography video operation and discovered a major computer BBS network. There were over 1,000 users on the system from across the U.S. , and many international users. (‘90)
Computer Crime: Pedophiles Alameda County, California District Attorney’s Office prosecuted two males on pedophilia-related charges after an investigation revealed the suspects were running a travel service for pedophiles to Thailand. The contact information was kept in Casio databank watches. (‘86)
Computer Crime: Pedophiles The pedophile victim profile is very similar to the computer hacker profile, making electronic networks a fertile hunting ground for pedophiles.
Computer Crime: Pedophiles Mr. Roger Deitz of Fremont, California told newspapers and TV stations that he posed as a 13 year old homosexual male and was able to make contact with 20 - 30 pedophiles using America  On-Line service. The service is assisting the FBI in a subsequent investigation but does not monitor private E-Mail. (New York Times 3/92)
Computer Crime: Pedophiles A San Jose, California detective posing as a pedophile on a BBS system was solicited by pedophiles Dean Lambey and Daniel Depew to participate in a kidnapping and "snuff flick" of a 12-year-old. FBI officials arrested both Lambey and Depew when they made an overt act to further the conspiracy. (Los Angeles Times 10/91)
Data Diddling ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Diddling: Attack Points ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Diddling: Examples ,[object Object],[object Object],[object Object]
Data diddling: Detection ,[object Object],[object Object],[object Object]
Trojan horse: Definition The covert placement of computer instructions in a program so that the computer will perform unauthorized functions. But usually still will allow the basic program to perform its intended purpose
Trojan horse: Common method for prevention or detection ,[object Object],[object Object],[object Object]
Trojan horse: Detection ,[object Object]
Trojan horse: Sources  ,[object Object],[object Object],[object Object],[object Object]
Salami Technique: Definition ,[object Object],[object Object],[object Object],[object Object]
Salami Technique:  Most common targets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Salami Technique: Detection ,[object Object],[object Object],[object Object],[object Object],[object Object]
Superzapping A program that permits the user to bypass all normal system controls. It makes possible the disclosure and/or modification of any program or data resident in the system.
Trap Doors/Back doors Computer instructions (part of a program) that allows users to access the program and/or data without initializing the program in the normal fashion. (Go in the back door)
Logic bomb Special unauthorized instruction imbedded in computer routines that determine process conditions or system status.
Scavenging: Definition Obtaining information that may be resident in or around a computer system
Scavenging: Sources ,[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere Àhnliche Inhalte

Was ist angesagt?

Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Adv Prashant Mali
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaMohammed Mahfouz Alhassan
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismGanesh DNP
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreofficesolomon24
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
Cyber law
Cyber law Cyber law
Cyber law Arshad_A
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywordskhansalman19
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 

Was ist angesagt? (20)

Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Shilpa
ShilpaShilpa
Shilpa
 
Cyber law
Cyber law Cyber law
Cyber law
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 

Andere mochten auch

Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Browne Jacobson LLP
 
Tackling Financial Crime through Business Process Management
Tackling Financial Crime through Business Process ManagementTackling Financial Crime through Business Process Management
Tackling Financial Crime through Business Process ManagementCognizant
 
The International Comparative Legal Guide to: Business Crime 2017
The International Comparative Legal Guide to: Business Crime 2017The International Comparative Legal Guide to: Business Crime 2017
The International Comparative Legal Guide to: Business Crime 2017Matheson Law Firm
 
Business Crime Research Assignment FC
Business Crime Research Assignment FCBusiness Crime Research Assignment FC
Business Crime Research Assignment FCMelissa Gibson
 
Global Economic Crime Survey
Global Economic Crime SurveyGlobal Economic Crime Survey
Global Economic Crime SurveyViren Aul
 
Chapter 2 Criminology
Chapter 2 CriminologyChapter 2 Criminology
Chapter 2 CriminologyKatrina Homer
 
The International Comparative Legal Guide to Business Crime 2016
The International Comparative Legal Guide to Business Crime 2016The International Comparative Legal Guide to Business Crime 2016
The International Comparative Legal Guide to Business Crime 2016Matheson Law Firm
 
Bribery and Corruption
Bribery and CorruptionBribery and Corruption
Bribery and CorruptionAdel Abouhana
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 

Andere mochten auch (12)

Legal500
Legal500Legal500
Legal500
 
Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?
 
Tackling Financial Crime through Business Process Management
Tackling Financial Crime through Business Process ManagementTackling Financial Crime through Business Process Management
Tackling Financial Crime through Business Process Management
 
The International Comparative Legal Guide to: Business Crime 2017
The International Comparative Legal Guide to: Business Crime 2017The International Comparative Legal Guide to: Business Crime 2017
The International Comparative Legal Guide to: Business Crime 2017
 
Business Crime Research Assignment FC
Business Crime Research Assignment FCBusiness Crime Research Assignment FC
Business Crime Research Assignment FC
 
Crime Unit
Crime UnitCrime Unit
Crime Unit
 
Global Economic Crime Survey
Global Economic Crime SurveyGlobal Economic Crime Survey
Global Economic Crime Survey
 
Crime in the Business World
Crime in the Business WorldCrime in the Business World
Crime in the Business World
 
Chapter 2 Criminology
Chapter 2 CriminologyChapter 2 Criminology
Chapter 2 Criminology
 
The International Comparative Legal Guide to Business Crime 2016
The International Comparative Legal Guide to Business Crime 2016The International Comparative Legal Guide to Business Crime 2016
The International Comparative Legal Guide to Business Crime 2016
 
Bribery and Corruption
Bribery and CorruptionBribery and Corruption
Bribery and Corruption
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 

Ähnlich wie Scope of Computer Crime Problem

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifelAhmed Tememe
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensicSANTANU KUMAR DAS
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeAccenture
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010- Mark - Fullbright
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Peter Timusk
 

Ähnlich wie Scope of Computer Crime Problem (20)

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Unit 1
Unit 1Unit 1
Unit 1
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
 

Mehr von CTIN

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drivesCTIN
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source ForensicsCTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaCTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicCTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsCTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac ForensicsCTIN
 
Nra
NraNra
NraCTIN
 
Live Forensics
Live ForensicsLive Forensics
Live ForensicsCTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Edrm
EdrmEdrm
EdrmCTIN
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassCTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrimeCTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search WarrantsCTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector ConcernsCTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007CTIN
 

Mehr von CTIN (20)

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Nra
NraNra
Nra
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Edrm
EdrmEdrm
Edrm
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 

KĂŒrzlich hochgeladen

The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfGale Pooley
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfGale Pooley
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfGale Pooley
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...ssifa0344
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Roomdivyansh0kumar0
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdfAdnet Communications
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k With Room...Suhani Kapoor
 
Independent Call Girl Number in Kurla MumbaiđŸ“Č Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla MumbaiđŸ“Č Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla MumbaiđŸ“Č Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla MumbaiđŸ“Č Pooja Nehwal 9892124323 💞 Full ...Pooja Nehwal
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfGale Pooley
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesMarketing847413
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...ssifa0344
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure servicePooja Nehwal
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdfAdnet Communications
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxanshikagoel52
 

KĂŒrzlich hochgeladen (20)

The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdf
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdf
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdf
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k With Room...
 
Independent Call Girl Number in Kurla MumbaiđŸ“Č Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla MumbaiđŸ“Č Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla MumbaiđŸ“Č Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla MumbaiđŸ“Č Pooja Nehwal 9892124323 💞 Full ...
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast Slides
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf
 
Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptx
 

Scope of Computer Crime Problem

  • 1. Computer Crime Scope of the problem
  • 2.
  • 3. Computer Crime: Background The accounting firm of Ernst & Young estimates that computer-related crime cost U.S. businesses about $3 billion to $5 billion a year in losses. Other researchers put the total loss figure as high as $40 billion if losses from Viruses and Software Piracy are included.
  • 4. Computer Crime: Background Only 6% to 11% of computer crime is reported. Of this segment, only 2% of the cases resulted in a conviction requiring any jail time. Less than a dozen computer criminals nationwide have served any time.
  • 5. Computer Crime: Background Average insured losses resulting from exploitation and tampering of computer systems are in the range of $500,000 - $600,000.
  • 6. Computer Crime: Background 75% to 80% of all computer crime is traceable to trusted insiders who had legitimate computer access, and/or knowledge of how operational procedures could be manipulated to their financial benefit.
  • 7. Computer Crime: Background Key motivational factors driving insider actions are: - lax security - revenge aimed at management.
  • 8. Computer Crime: Background Average bank robber: $5K / 90% / 7 yrs hard time vs. Computer criminal: $600K / 2%/ 2 yrs min. security
  • 9. Computer Crime: Background Normal computer crime takes less than one second to pull off, and is usually done from another state or foreign country.
  • 10. Computer Crime: Background A 1989 study by the National Center for Computer Crime Data of 3,500 companies found an average loss of $110,000, 365 man-hours, and 26 hours of computer time for each computer crime event discovered. 70% of all events involved theft of money or services.
  • 11. Computer Crime: Background When a computer criminal is caught, it is "because such a large sum of money is taken that even the most ill-prepared system will note the anomaly." (Donn Parker. SRI computer crime expert)
  • 12. Computer Crime: Background "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than a bomb." "To date, we have been remarkably lucky... Unfortunately, there is reason to believe that our luck will soon run out."
  • 13. Computer Crime: Background "The committee is concerned that the development of legislation and case law is being outpaced by the growth of technology and changes in our society." (Source: Computers At Risk, National Research Council, 1991)
  • 14. Computer Crime: Insider Examples Stanley Mark Rifkin hits Security Pacific Bank for $10.2 million using EFT passwords he observed pasted to terminals in the money transfer room of the bank. ('78)
  • 15. Computer Crime: Insider Examples A New York brokerage firm disables the audit trail on their computer system to speed up operations. Shortly after, a clerk disappears to Switzerland with an estimated $28.8 million. ('86)
  • 16. Computer Crime: Insider Examples The computer program that Volkswagen of West Germany used to control its international finance operations was altered so that 5 high-level executives got away with $260 million. No charges filed, but all fired! ('87)
  • 17. Computer Crime: Insider Examples A London bank releases a press statement claiming their banks are not vulnerable to fraud the same day 4 persons are arrested with 1,864 valid, but forged, ATM cards in their possession. ('87)
  • 18. Computer Crime: Insider Examples Seven New York men use stolen EFT codes to embezzle S70 million from the bank accounts of Merrill-Lynch and United Airlines. They are caught only after they cause Merrill-Lynch's account to be overdrawn. ('88)
  • 19. Computer Crime: Insider Examples A Delaware state lottery computer system malfunctions, allowing unscrupulous lottery vendors to help themselves to $555,000 in winning tickets after the numbers had already been drawn. ('89)
  • 20. Computer Crime: Insider Examples The Washington State prison system suspends a program where inmates were allowed to keep PCs in their cells, citing security issues after one prison's main computer system experienced unusual problems. ('89)
  • 21. Computer Crime: Insider Examples 18 inmates working as data entry operators at the Tennessee State Prison guess the password to a payroll system and give themselves raises ranging from $20 to $500 a month. ('90)
  • 22. Computer Crime: Insider Examples U.S. Attorney's Office in Kentucky sells computer at surplus auction for $45, and then realizes that 7 years worth of data on Federal Agents and Witness Protection participants were not erased. ('90)
  • 23. Computer Crime: Insider Examples Laptop computer is stolen from Wing Commander of British military. On the laptop were classified plans for Persian Gulf war. Returned 4 days later in the mail. ('91)
  • 24. Computer Crime: Insider Examples Four Cal Poly University students are arrested after charging $250,000 in goods to MasterCard and Visa cards. They gained access to Equifax, and copied some 1,600 credit reports. They then used the good credit-card numbers to re-program the magnetic data on stolen credit cards. They did this from a laptop in their car. ('91)
  • 25.
  • 26.
  • 27. Computer Crime: Hacker Profile Profile of a typical hacker is a white or Asian male, age 14 to 20, with average to below-average grades, an introvert who does not relate well to even his peers, has no father in the home, and has a personal life that is severely disorganized.
  • 28. Computer Crime: Hacker Profile Hackers will spend 200 to 300 hours a month on the phone exchanging messages with other hackers, as well as trying to gain entry to computer systems world wide.
  • 29. Computer Crime: Malicious Hackers AF-OSI nabs 14 year old for hacking into computers at the Pentagon and downloading several unclassified documents. Use of an "800" number allowed him to be traced. ('89)
  • 30. Computer Crime: Malicious Hackers Kevin Mitnick, the "Darth Vader of Hackers," hacks into DEC and copies the security software (loss, $4 million) they use to protect their systems. When arrested, he had 16 stolen MCI codes in his possession. He also shut down 911 service in California ('89)
  • 31. Computer Crime: Malicious Hackers Republican Party staff member from New Jersey hacks into the Democratic Party computer system and copies confidential files. Files showed that state workers were using state time for campaign work. ('90)
  • 32. Computer Crime: Malicious Hackers The Legion of Doom is credited with planting a virus in the AT&T Switching Network. The system was down for 9 hours. 25 million long distance phone calls get busy signal. (Jan 15, 1990 - MLK holiday)
  • 33. Computer Crime: Malicious Hackers Johnson Space Center denies it has lost $12 million over two years due to abuse of their phone system. One stolen access code was distributed to hundreds of hackers. ('90)
  • 34. Computer Crime: Malicious Hackers Leslie Lynne Douchette (AKA, Kyrie), ring-leader of nationwide group of hackers, is sentenced to 27 months. Losses directly tied to her pivot on 481 MCI access codes in her possession that accounted for S595,000 in long-distance phone fraud. ('90)
  • 35. Computer Crime: Malicious Hackers "Hacker Heaven": Belgium, Greece, Italy and the Netherlands. As of August 1991, they had no laws that made unauthorized access/tampering of computers a crime.
  • 36. Computer Crime: Malicious Hackers U.S. vendor of secure modems issues challenge to hackers: "Hack into my system and I will give you cash reward." 8,000 hackers tried. ('91)
  • 37.
  • 38. Computer Crime: Viruses & Worms The goal of both viruses and worms is to replicate themselves. They may, or may-not trigger on some external event that causes them to be annoying or destructive.
  • 39.
  • 40. Computer Crime: Viruses & Worms The public attitude toward viruses is changing. They are now seen as a bizarre form of industrial sabotage, rather than a technological version of a practical joke.
  • 41. Computer Crime: Viruses & Worms "Christmas Tree" virus forces IBM to shut down 350,000 internal communications networks world- wide for nearly three days to permit location and removal of the virus. ('87)
  • 42. Computer Crime: Viruses & Worms The Internet Unix worm, written by Robert Morris, caused 6,200 computer systems to crash, it took 1 million hours to repair the damage, at an estimated cost of $97 million.
  • 43. Computer Crime: Viruses & Worms Convicted, Morris could have gotten five years and a $250,000 fine, but instead a U.S. District Court Judge gave him 400 hours of community service, a $10,000 fine and 3 years probation . ('88)
  • 44.
  • 45. Computer Crime: Viruses & Worms One of the most common viruses, the "Friday the 13th," was written by a programmer in the Middle East as a protest against the 40-year anniversary of the founding of Israel.
  • 46.
  • 47. Computer Crime: Pedophiles Medford, Massachusetts Police raided a child pornography video operation and discovered a major computer BBS network. There were over 1,000 users on the system from across the U.S. , and many international users. (‘90)
  • 48. Computer Crime: Pedophiles Alameda County, California District Attorney’s Office prosecuted two males on pedophilia-related charges after an investigation revealed the suspects were running a travel service for pedophiles to Thailand. The contact information was kept in Casio databank watches. (‘86)
  • 49. Computer Crime: Pedophiles The pedophile victim profile is very similar to the computer hacker profile, making electronic networks a fertile hunting ground for pedophiles.
  • 50. Computer Crime: Pedophiles Mr. Roger Deitz of Fremont, California told newspapers and TV stations that he posed as a 13 year old homosexual male and was able to make contact with 20 - 30 pedophiles using America On-Line service. The service is assisting the FBI in a subsequent investigation but does not monitor private E-Mail. (New York Times 3/92)
  • 51. Computer Crime: Pedophiles A San Jose, California detective posing as a pedophile on a BBS system was solicited by pedophiles Dean Lambey and Daniel Depew to participate in a kidnapping and "snuff flick" of a 12-year-old. FBI officials arrested both Lambey and Depew when they made an overt act to further the conspiracy. (Los Angeles Times 10/91)
  • 52.
  • 53.
  • 54.
  • 55.
  • 56. Trojan horse: Definition The covert placement of computer instructions in a program so that the computer will perform unauthorized functions. But usually still will allow the basic program to perform its intended purpose
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63. Superzapping A program that permits the user to bypass all normal system controls. It makes possible the disclosure and/or modification of any program or data resident in the system.
  • 64. Trap Doors/Back doors Computer instructions (part of a program) that allows users to access the program and/or data without initializing the program in the normal fashion. (Go in the back door)
  • 65. Logic bomb Special unauthorized instruction imbedded in computer routines that determine process conditions or system status.
  • 66. Scavenging: Definition Obtaining information that may be resident in or around a computer system
  • 67.

Hinweis der Redaktion

  1. File Name: Scope.ppt This presentation provides the student with an overview of the computer crime problem.