SlideShare ist ein Scribd-Unternehmen logo
1 von 15
CYBERCRIME:
ARE YOU THE NEXT VICTIM?
CYBERCRIME:
ARE YOU THE NEXT VICTIM?
   Sandra J. Putnam
   Assistant Special Agent in Charge
   Georgia Bureau of Investigation


   Tina Freestone
   Chair of the Criminal Justice Degree Program
   Grantham University
Cost of Cybercrime
   Norton Cybercrime Report for 2011
       431 adult victims globally

       Losses of $388 billion (time & money loss)

       14 adults become a victim every second

       Most common type of cyber crime is computer
        viruses and malware
Cost of Cybercrime
   Norton Cybercrime Report for 2011
       431 adult victims globally

       Losses of $388 billion (time & money loss)

       14 adults become a victim every second

       Most common type of cyber crime is computer
        viruses and malware
What is Cybercrime?
   Computers being used to commit crime

   Computers as the target of a crime

   Computers storing evidence of a crime that
    has been committed
Types of Cybercrime

     Traditional Crimes             Technological Crimes



    Child Pornography             Viruses
    Human Trafficking             Malware
    Identity Theft                Hacking
    Drugs Dealing                 Denial of Service Attacks
    Harassment/Threats            Copyright Violations
    Fraud/White Collar Crime      Cyber-Stalking
    Murder                        Phishing
    Theft                         Sexting
Challenges to Law Enforcement
   Computer Literate Criminals
       Availability of technology for low or no cost

   Technology is pushing society into the information age

   Who is responsible for policing the Internet?
       Jurisdiction of crime

   Training and Equipment costs

   Evidence Integrity
       Physical versus Digital Evidence
How to Protect Yourself
   Understand that cybercrime exist and your vulnerable

   Protect your computer with the latest anti-virus and malware
    software

   Use good passwords

   Lock down all social networking sites to only be visible to
    “FRIENDS”

   Run an annual credit report

   Residential wireless router should be encrypted
    and password protected
AN ICAC CASE STUDY
A GBI Internet Crimes Against Children Task Force
Investigation into finding the identity of 3 little girls
whose images were posted on the Internet.
Investigations
Questions
Grantham University and the
Criminal Justice department
Thank You for attending and
participating in today's Webinar.

We encourage you to follow up with any
questions you may have regarding
Criminal Justice or Cybercrime:

tfreestone@grantham.edu
Tina Freestone
Grantham University and the
Criminal Justice department
Thank You for attending and
participating in today's Webinar.

We encourage you to follow up with any
questions you may have regarding
Criminal Justice or Cybercrime:

tfreestone@grantham.edu
Tina Freestone
IACP Conference Booth #4711
www.grantham.edu
1.888.Y.GRANTHAM




Call to speak to a representative today.

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia WatsonPatricia M Watson
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan projectSyed Bokhari
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]Videoguy
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismGanesh DNP
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanSVS College
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 

Was ist angesagt? (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Polinter11
Polinter11Polinter11
Polinter11
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandan
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 

Andere mochten auch

Studijsko putovanje u Nemačku 2010.
Studijsko putovanje u Nemačku 2010.Studijsko putovanje u Nemačku 2010.
Studijsko putovanje u Nemačku 2010.Radmila Nikolić
 
Get Social: LinkedIn Classmates
Get Social: LinkedIn ClassmatesGet Social: LinkedIn Classmates
Get Social: LinkedIn ClassmatesUFWarrington
 
Stept by stept karli
Stept by stept karliStept by stept karli
Stept by stept karlikawiebe
 
Create custom paper size in crystal reports
Create custom paper size in crystal reportsCreate custom paper size in crystal reports
Create custom paper size in crystal reportsDavid Kurniawan
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 

Andere mochten auch (7)

Mr. alcock first assinment
Mr. alcock first assinmentMr. alcock first assinment
Mr. alcock first assinment
 
Studijsko putovanje u Nemačku 2010.
Studijsko putovanje u Nemačku 2010.Studijsko putovanje u Nemačku 2010.
Studijsko putovanje u Nemačku 2010.
 
X-Rays
X-RaysX-Rays
X-Rays
 
Get Social: LinkedIn Classmates
Get Social: LinkedIn ClassmatesGet Social: LinkedIn Classmates
Get Social: LinkedIn Classmates
 
Stept by stept karli
Stept by stept karliStept by stept karli
Stept by stept karli
 
Create custom paper size in crystal reports
Create custom paper size in crystal reportsCreate custom paper size in crystal reports
Create custom paper size in crystal reports
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Ähnlich wie Cybercrime | IT Secutiry (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 

Cybercrime | IT Secutiry

  • 1. CYBERCRIME: ARE YOU THE NEXT VICTIM?
  • 2. CYBERCRIME: ARE YOU THE NEXT VICTIM? Sandra J. Putnam Assistant Special Agent in Charge Georgia Bureau of Investigation Tina Freestone Chair of the Criminal Justice Degree Program Grantham University
  • 3. Cost of Cybercrime  Norton Cybercrime Report for 2011  431 adult victims globally  Losses of $388 billion (time & money loss)  14 adults become a victim every second  Most common type of cyber crime is computer viruses and malware
  • 4.
  • 5. Cost of Cybercrime  Norton Cybercrime Report for 2011  431 adult victims globally  Losses of $388 billion (time & money loss)  14 adults become a victim every second  Most common type of cyber crime is computer viruses and malware
  • 6. What is Cybercrime?  Computers being used to commit crime  Computers as the target of a crime  Computers storing evidence of a crime that has been committed
  • 7. Types of Cybercrime Traditional Crimes Technological Crimes  Child Pornography  Viruses  Human Trafficking  Malware  Identity Theft  Hacking  Drugs Dealing  Denial of Service Attacks  Harassment/Threats  Copyright Violations  Fraud/White Collar Crime  Cyber-Stalking  Murder  Phishing  Theft  Sexting
  • 8. Challenges to Law Enforcement  Computer Literate Criminals  Availability of technology for low or no cost  Technology is pushing society into the information age  Who is responsible for policing the Internet?  Jurisdiction of crime  Training and Equipment costs  Evidence Integrity  Physical versus Digital Evidence
  • 9. How to Protect Yourself  Understand that cybercrime exist and your vulnerable  Protect your computer with the latest anti-virus and malware software  Use good passwords  Lock down all social networking sites to only be visible to “FRIENDS”  Run an annual credit report  Residential wireless router should be encrypted and password protected
  • 10. AN ICAC CASE STUDY A GBI Internet Crimes Against Children Task Force Investigation into finding the identity of 3 little girls whose images were posted on the Internet.
  • 13. Grantham University and the Criminal Justice department Thank You for attending and participating in today's Webinar. We encourage you to follow up with any questions you may have regarding Criminal Justice or Cybercrime: tfreestone@grantham.edu Tina Freestone
  • 14. Grantham University and the Criminal Justice department Thank You for attending and participating in today's Webinar. We encourage you to follow up with any questions you may have regarding Criminal Justice or Cybercrime: tfreestone@grantham.edu Tina Freestone IACP Conference Booth #4711