SlideShare ist ein Scribd-Unternehmen logo
1 von 21
#KEYS AS
WEAPON
Cybercrime and Security
What is Cybercrime?
Using the Internet to commit a
crime.
 Identity Theft
 Hacking
 Viruses
Cybercrimes and
Cybercriminals
 There have been many stories in the media
about computer crime.
 Sometimes hackers have been portrayed as
“heroes”
 Perceptions about hacking and computer
crime are changing because of increased
dependency on the Internet for our
infrastructure.
Cybercrime Components
Computers
Cell Phones
PDA’s
Game Consoles
A "Typical"Cybercriminal
 Parker (1998) believes that typical computer
hackers tend to exhibit three common traits:
 Precociousness;
 Curiosity;
 persistence.
 Many people conceive of the typical computer
hacker as someone who is a very bright,
technically sophisticated, young white male – as
portrayed in the popular movie War Gam e s .
Hacking vs. Cracking
 Can any Relevant Legal Distinctions Be
Drawn?
 Computer criminals are often referred to as
hacke rs.
 The term "hacker" has taken on a pejorative
connotation.
Hacking vs. Cracking
 Himanen (2001) notes that the term "hacker"
originally applied to anyone who "programmed
enthusiastically" and who believed that
"information sharing is a powerful positive
good."
 A hacker as an "expert or enthusiast of any
kind."
 Note that a hacker need not be a co m pute r
enthusiast.
 e.g., someone can be an astronomy hacker.
High-Profile Cybercrime-
related Cases
 TJ Maxx data breach
 45 million credit and debit card numbers stolen
 Kwame Kilpatrick
 Cell phone text messages
 BTK Serial Killer
 Kevin Mitnick
Distinguishing Cybercrimes
from Cyber-related Crimes
 Many crimes that involve the use of cyber-
technology are not genuine cybercrimes.
 Crimes involving pedophilia, stalking, and
pornography can each be carried with or without
the use of cybertechnology.
 Hence, there is nothing about these kinds of
crimes that is unique to cybertechnology.
 These and similar crimes are better understood
as instances of cybe r-re late d crimes.
Computer Security - Threats
 Malware
 Software that has a malicious purpose
 Viruses
 Trojan horse
 Spyware
Computer Security - Threats
Figure 1.1 – DoS and DDoS Models
Genuine Cybercrimes
 If we accept the working definition of
cybercrime proposed by Tavani (2000), then
we can sort out and identify specific
cybercrimes.
 We can also place those crimes into
appropriate categories.
Cybercrimes and Cyberrelated
Crimes
Cybercrimes
Cyberspecific
Cyberpiracy
Cybertrespass
Cybervandalism
Cyberrelated Crimes
Cyberexacerbated Cyberassisted
Cyberstalking
Internet Pedophilia
Internet Pornography
Income-tax cheating
(with a computer)
Physical assault with
a computer
Property damage
using a computer
hardware device
(e.g., throwing a
hardware device
through a window)
Hackers and the Law
 Courts and juries understand very well
distinctions in crimes involving breaking and
entering into property in physical space.
 A person who picks the lock of a door handle, or who turns an
unlocked door handle but does not enter someone's house,
would not likely receive the same punishment as someone who
also turns enters that person's house.
 A person who illegally enters someone's house only to snoop
would probably not receive the same punishment as someone
who also steals items or vandalize property, or both.
Three Categories of Cybercrime
1. Cyberpiracy - using cyber-technology in unauthorized ways to:
a. reproduce copies of proprietary software and proprietary information, or
b. distribute proprietary information (in digital form) across a computer
network.
2. Cybertrespass - using cyber-technology to gain or to exceed unauthorized access to:
a. an individual's or an organization's computer system, or
b. a password-protected Web site.
3. Cybervandalism - using cyber-technology to unleash one or more programs that:
a. disrupt the transmission of electronic information across one or more
computer networks, including the Internet, or
b. destroy data resident in a computer or damage a computer system's
resources, or both.
Computer Security -
Terminology
 Script Kiddies
 Someone that calls themselves a ‘hacker’ but
really isn’t
 Ethical Hacker
 Someone hired to hack a system to find
vulnerabilities and report on them.
 Also called a ‘sneaker’
Determining the Criteria
 Consider three hypothetical scenarios: 
 Scenario 1: Lee steals a computer device (e.g.,
a printer) from a computer lab;
 Scenario 2: Lee breaks into a computer lab and
then snoops around;
 Scenario 3: Lee enters a computer lab that he is
authorized to use and then places an explosive
device, which is set to detonate a short time
later, on a computer system in the lab.
Computer Security -
Terminology
 Security Devices
 Firewall
 Barrier between network and the outside world.
 Proxy server
 Sits between users and server. Two main functions
are to improve performance and filter requests.
 Intrusion Detection Systems (IDS)
 Monitors network traffic for suspicious activity.
Organized Crime on the
Internet
 Career criminals, including those involved in
organized crime, are now using cyberspace to
conduct many of their criminal activities.
 Gambling and drug trafficking have moved to an
Internet venue.
 Scams involving Internet adoption and Internet
auctions have increased.
 These kinds of crimes tend to receive far less
attention in the popular media than those
perpetrated by teenage hackers.
Defining Cybercrime
 When is a crime a co m pute r crim e ?
 The problem of crite ria.
 Are all crimes involving the use or presence of
a computer necessarily computer crimes?
 Gotterbarn asks is a murder committed with a
surgeon’s scalpel is an issue for medical
ethics or just an ordinary crime.
Be Safe in { CYBER WORLD }
THANKS
 FOR
YOUR
 INTEREST !

Weitere ähnliche Inhalte

Was ist angesagt?

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
Priya Saluja
 

Was ist angesagt? (20)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 

Andere mochten auch (10)

Cyber security
Cyber securityCyber security
Cyber security
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slides
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slidesLMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slides
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slides
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
اساسيات الاحصاء
اساسيات الاحصاءاساسيات الاحصاء
اساسيات الاحصاء
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Ähnlich wie Growing cyber crime

Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
24sneha
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
JatinRajput67
 

Ähnlich wie Growing cyber crime (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Unit 1
Unit 1Unit 1
Unit 1
 
Computer crime (1)
Computer crime (1)Computer crime (1)
Computer crime (1)
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 

Kürzlich hochgeladen

( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
nirzagarg
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 

Kürzlich hochgeladen (20)

Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 

Growing cyber crime

  • 2. What is Cybercrime? Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses
  • 3. Cybercrimes and Cybercriminals  There have been many stories in the media about computer crime.  Sometimes hackers have been portrayed as “heroes”  Perceptions about hacking and computer crime are changing because of increased dependency on the Internet for our infrastructure.
  • 5. A "Typical"Cybercriminal  Parker (1998) believes that typical computer hackers tend to exhibit three common traits:  Precociousness;  Curiosity;  persistence.  Many people conceive of the typical computer hacker as someone who is a very bright, technically sophisticated, young white male – as portrayed in the popular movie War Gam e s .
  • 6. Hacking vs. Cracking  Can any Relevant Legal Distinctions Be Drawn?  Computer criminals are often referred to as hacke rs.  The term "hacker" has taken on a pejorative connotation.
  • 7. Hacking vs. Cracking  Himanen (2001) notes that the term "hacker" originally applied to anyone who "programmed enthusiastically" and who believed that "information sharing is a powerful positive good."  A hacker as an "expert or enthusiast of any kind."  Note that a hacker need not be a co m pute r enthusiast.  e.g., someone can be an astronomy hacker.
  • 8. High-Profile Cybercrime- related Cases  TJ Maxx data breach  45 million credit and debit card numbers stolen  Kwame Kilpatrick  Cell phone text messages  BTK Serial Killer  Kevin Mitnick
  • 9. Distinguishing Cybercrimes from Cyber-related Crimes  Many crimes that involve the use of cyber- technology are not genuine cybercrimes.  Crimes involving pedophilia, stalking, and pornography can each be carried with or without the use of cybertechnology.  Hence, there is nothing about these kinds of crimes that is unique to cybertechnology.  These and similar crimes are better understood as instances of cybe r-re late d crimes.
  • 10. Computer Security - Threats  Malware  Software that has a malicious purpose  Viruses  Trojan horse  Spyware
  • 11. Computer Security - Threats Figure 1.1 – DoS and DDoS Models
  • 12. Genuine Cybercrimes  If we accept the working definition of cybercrime proposed by Tavani (2000), then we can sort out and identify specific cybercrimes.  We can also place those crimes into appropriate categories.
  • 13. Cybercrimes and Cyberrelated Crimes Cybercrimes Cyberspecific Cyberpiracy Cybertrespass Cybervandalism Cyberrelated Crimes Cyberexacerbated Cyberassisted Cyberstalking Internet Pedophilia Internet Pornography Income-tax cheating (with a computer) Physical assault with a computer Property damage using a computer hardware device (e.g., throwing a hardware device through a window)
  • 14. Hackers and the Law  Courts and juries understand very well distinctions in crimes involving breaking and entering into property in physical space.  A person who picks the lock of a door handle, or who turns an unlocked door handle but does not enter someone's house, would not likely receive the same punishment as someone who also turns enters that person's house.  A person who illegally enters someone's house only to snoop would probably not receive the same punishment as someone who also steals items or vandalize property, or both.
  • 15. Three Categories of Cybercrime 1. Cyberpiracy - using cyber-technology in unauthorized ways to: a. reproduce copies of proprietary software and proprietary information, or b. distribute proprietary information (in digital form) across a computer network. 2. Cybertrespass - using cyber-technology to gain or to exceed unauthorized access to: a. an individual's or an organization's computer system, or b. a password-protected Web site. 3. Cybervandalism - using cyber-technology to unleash one or more programs that: a. disrupt the transmission of electronic information across one or more computer networks, including the Internet, or b. destroy data resident in a computer or damage a computer system's resources, or both.
  • 16. Computer Security - Terminology  Script Kiddies  Someone that calls themselves a ‘hacker’ but really isn’t  Ethical Hacker  Someone hired to hack a system to find vulnerabilities and report on them.  Also called a ‘sneaker’
  • 17. Determining the Criteria  Consider three hypothetical scenarios:   Scenario 1: Lee steals a computer device (e.g., a printer) from a computer lab;  Scenario 2: Lee breaks into a computer lab and then snoops around;  Scenario 3: Lee enters a computer lab that he is authorized to use and then places an explosive device, which is set to detonate a short time later, on a computer system in the lab.
  • 18. Computer Security - Terminology  Security Devices  Firewall  Barrier between network and the outside world.  Proxy server  Sits between users and server. Two main functions are to improve performance and filter requests.  Intrusion Detection Systems (IDS)  Monitors network traffic for suspicious activity.
  • 19. Organized Crime on the Internet  Career criminals, including those involved in organized crime, are now using cyberspace to conduct many of their criminal activities.  Gambling and drug trafficking have moved to an Internet venue.  Scams involving Internet adoption and Internet auctions have increased.  These kinds of crimes tend to receive far less attention in the popular media than those perpetrated by teenage hackers.
  • 20. Defining Cybercrime  When is a crime a co m pute r crim e ?  The problem of crite ria.  Are all crimes involving the use or presence of a computer necessarily computer crimes?  Gotterbarn asks is a murder committed with a surgeon’s scalpel is an issue for medical ethics or just an ordinary crime.
  • 21. Be Safe in { CYBER WORLD } THANKS  FOR YOUR  INTEREST !