Introduction to Cybercrime handouts.docx

Full Transcript

**Introduction to Cybercrime** **Computer** The computer was born not for entertainment or email but out of a need to solve a serious number-crunching crisis. By 1880, the U.S. population had grown so large that it took more than seven years to tabulate in the U.S. census results. The government s...

**Introduction to Cybercrime** **Computer** The computer was born not for entertainment or email but out of a need to solve a serious number-crunching crisis. By 1880, the U.S. population had grown so large that it took more than seven years to tabulate in the U.S. census results. The government sought a faster way to get the job done, Rise to punch-card based computers that took the entire rooms. **Historical Development of Computer** **1858-** Important milestone in telegraphy was installed by the Translantic Cable which liked U.S and Europe, but failed after four weeks of operation. **1875-** Emile Bandot, developed a code for telegraphy on which each letter was encoded into fixed length binary code. **1876-** Alexander Graham Bell patented inventions of telephone. **1877-** He established the Bell Telephone Company. **1894-** Oliver, lodgd the wireless communication system, using the principle of electromagnetic radiation, introduce by Oersted, Farady, Gauss, Maxwell and Hertz. **1895-** Gugliermo Marconi is credited on his development of the wireless telegraphy. **1897-** Strawger, develop the first automatic switch operated auto mechanically in a step by step method. **7 1906-** Lee De Forest invented the triode amplifier which introduced signal applications in the telephone company system. **1929-** Vladimir Zworyki developed and demonstrated the television system. **1933-** Armstrong builds and introduced the AM-FM communication system, using the vacuum tube and triode amplifier earlier developed. **AM (or Amplitude Modulation) and FM (or Frequency Modulation).** **1960-** Bell Telephone Laboratory developed the Digital Switch using electromagnetic digital transistors and was made serviceable in Illinois. **What does computer means?** A computer is a machine or device that performs processes, calculations and operations based on instructions provided by a software or hardware program. It is designed to execute application and provides a variety of solutions by combining integrated hardware and software components. A computer is essentially a device that can perform a wide range of tasks by following specific instructions. Here's a breakdown of the key components of the definition: 1. **Machine or Device**: A computer is classified as a machine because it consists of physical components (hardware) that work together to perform tasks. 2. **Processes, Calculations, and Operations**: Computers can handle various types of tasks, including: - **Processes**: Managing data and executing commands. - **Calculations**: Performing mathematical operations. - **Operations**: Carrying out specific functions as directed by software. 3. **Instructions from Software or Hardware**: Computers operate based on instructions provided by: - **Software**: Programs that tell the computer what to do (e.g., applications, operating systems). - **Hardware**: Physical components that can also have built-in instructions (e.g., firmware). 4. **Designed to Execute Applications**: Computers are built to run applications, which are specific programs designed to perform particular tasks (e.g., word processing, gaming). 5. **Variety of Solutions**: By combining hardware and software, computers can solve numerous problems and perform diverse functions, from simple calculations to complex simulations. 6. **Integrated Hardware and Software Components**: The effectiveness of a computer comes from the seamless integration of its physical parts (like the CPU, memory, and storage) with the software that runs on it, allowing for efficient operation and functionality. In summary, a computer is a versatile tool that processes information and performs tasks by executing instructions from software, utilizing its hardware components to deliver various solutions. **Basic Parts of the computer** As computing devices get sleeker and more compressed to save space it gets harder for most users to conceptualize all the dilerent parts that make It perform so many functions. But knowing about these separate functions is important for gathering evidence and explaining how the evidence was created and obtained. Places where data is stored, either permanently or temporaril, of particular importance for obtaining evidence. Summary of the parts of a computer includes: 1\. Case 2\. Power supply 3\. Motherboard 4\. Processor or Central Processing Unit 5\. Memory 6\. Persistent Memory 7\. Interfaces for input and output with 8\. Physical ports 9\. External storage, servers, and more **1. Case** Computers would not last long without a case because it protects the internal components from damage, dirt, and moisture. But beyond holding the guts of the computer, the case is an important facet of the device. The case provides the interface Between the device, the user, and the outside world. For example, a case might include a view-only Screen, touch screen, keyboard, microphone, as wel as physical ports for a keyboard, monitor, mouse, power supply, and data exchange. **2. Power source** Computers need electricity to operate, and that means they need power from an internal battery, from an electrical outlet, or both. Portable devices like laptops, tablets, and smartphones rely upon battery power, with periodic charging. Desktop computers need to be plugged into an electrical outlet, but also have a small battery to retain a tiny amount of data, such as the time and date, and to keep the internal clock running. **3. Motherboard** The motherboard is an important computer component because it is where everything else connects to The motherboard is a decently sized circuit board that lets other components communicate A motherboard has ports that face outside a PC\'s case, so you can charge your computer, plug in a monitor, or connect a mouse. A computer\'s motherboard also contains słots for expansions, so you can add additional accessory ports if you wish. The motherboard also stores low level of information like the system time even guide when the computer is turned off consulting, n.d). **4. Processors (Central Processing Unit) (intel)** The work of a computer is done through computer processors, also known central processing units (CPUs). These are computer chips, or groups of chips, that do the thinking (the massive number of binary Calculations) of the computer necessary to run all prograrns. The CPU is attached to the computer s motherboard, the central pieceof circuitry that connects the device\'s many chips and electronic components. **5. Memory (ROM and RAM)** **a. Read-Only Memory (ROM)** Read-only memory computer chips store firmware programs that holds the instructions to power up or boot, the computer to control the DVD drives, hard disk drives and graphic cards. ROM also known as flash memory and is considered non-volatile memory. ROM is an important part of the BIOS (basic input/output system) operation. This BIOS process if often important in forensic investigations. When powering up the computer, the BIOS enables the CPU to communicate with the hard disk drive and the input/output devices that are attached to the computer. It is important to note, that booting a computer with the hard disk drive attached can cause the data held on the disk drive to be altered, which would compromise the evidence the hard disk drive holds. If digital forensic examiners control the BIOS functions, they can secure the data held on the hard disk drive (Girard, 2015). **b. Random Access Memory (RAM)** A computer relies on a type of memory - known as temporary or volatile storage - to perform most functions. This volatile storage is also called Random Access Memory (RAM), Typically, RAM is found within computer chips that store the data as electrical charges. RAM chips are connected to the motherboard of the computer, along with the CPU. RAM is volatile and temporary because, when the power is turned on. RAM is discharged, and the contents are lost. RAM is fast and is used by computers to load both the programs the user runs, as well as the data those programs access. **6. Persistent storage (HDD/SSD)** Persistent (long-term) storage holds data stored in the computer even after the power is disconnected. Persistent storage mechanisms include hard disk drives (HDD) and solid-state drives (SSD) HDDS Were the standard method for persistent data storage for many years. These drives have spinning disks or platters divided into smaller sectors. then ultimately into bit-sized storage units, each of which holds a magnetic charge holding the bit value. SSDs are a newer type of storage drive. These drives do not have any moving parts, but rather are computer chips that store the data as electrical charges. Due to massive speed and reliability improvements, SSDs are fast becoming the standard for commercial use. **7. lnterfaces for input and output with user** Users (whether a victim, evidence gatherer, or cybercriminal) must be abłe to communicate with computers, Users send and receive information to computers through mechanisms like the keyboard, mouse, monitor microphone, and speakers. 8. **Physical ports** **9. External storage, and servers** Beyond a computer\'s internal storage, a user Memory Card Reader might store data by USB Flash connecting to external storage devices and other computers. Some common external storage devices are external hard drives flash drives (thumb drives) or more complicated storage devices, such as network attached storage, servers like google drive, Microsoft, and Icloud for macintosh. A computer is made up of multiple parts and components that facilitate functionality. A computer has two primary categories: 1. **Hardware-** physically structure that house a computer's processor, memory, storage, communication ports and peripheral. **Computers are usually categories into three general categories:** 1\. Supercomputer- The fastest, largest, most powerful and most expensive computer. 2\. Mainframe Computer- This is a little smaller and less powerful than the supercomputer, but, like the supercomputer it is also expensive. 3\. Personal Computer (PC)- This is the computer that most people use in their daily lives. This computer is much smaller, less powerful and less expensive than the supercomputer and the mainframe computer. There are two main types of personal computers. Macintosh (Macs) and Personal computers (PC). The main difference between the two is the operating systems and the processors they use. **Computer Hardware** You learned earlier that a computer has electronic and mechanical parts known as hardware. Hardware includes input devices, output devices, system unit, storage devices and communication devices. Without these components we would not be able to use the computers. **Input Devices -** An input device is any hardware component that allows you to enter data, programs, commands, and other information into the computer. There are many input devices. 1. **Keyboard -** You use the keyboard to type letters, numbers, and symbols into the computer. 2. Mouse - The mouse is a pointing device that has a pointer that changes into different shapes as you use the mouse. You click the mouse by pressing and releasing the button. This action allows you to enter data when using the computer. 3. Scanner - This input device copies from paper into the computer. 4. Microphone - The microphone is usually used for voice input into the computer. 5. Digital Camera - The digital camera allows you to take pictures that you can input into your computer. 1. PC Video Camera - The PC video camera allows you to both take video and still images that you can input onto your computer. Commonly used output devices are as follow: 1. **Monitor -** This output device displays your information on a screen. Ang monitor is a type of output device that visually displays information that was processed by a computer or other similar device. It consists of a screen, so ang purpose ni screen is to project the text, mga images, and videos, and uban pang data are shown sa screen. So si monitor will receive signals gikan sa computer's graphics card and then iyaha tong i translates into visual output, it allows users to interact with the system through a graphical interface. Monitors are essential para ma view Ninyo ang mga tasks nga inyohang gitrabaho, like documents, websites, or applications. 2. **Printer -** This output device produces information on paper. The printed output is called a hard copy. Si printer is an output device that takes digital data gikan sa computer and then iyang I transfers onto paper, that produces a physical version sa isa ka information. Then kani nga physical output, often a document, image, or other data, and mao na syay ginatawag nato ug hard copy because it exists in a tangible form, kung moingon tag tangible we can feel, we can smell and makita nato ang isa ka butang on the other hand ang tawag pod sa digital versions that are viewed on screens is called \*\*soft copies. 3. **Speaker-** Sound is the type of output you will get from a speaker. It means that a speaker, which is a device nga ginagamit sa audio systems, wherein ang iyang outputs is sound. In technical terms, si speaker converts electrical signals into audible sound waves. Kani nga sound waves are what we hear when audio is played through the speaker. Therefore, ang primary function ni speaker is to produce sound as its output. 1. **Word Processing Application**: Microsoft Word. This program allows you to create documents in Microsoft Word. This program allows you to type, edit, and format text. 2. **Spreadsheet Application**: Outlook Express is an example of a spreadsheet program. This program allows you to organize data in rows and columns. 3. **Database Application**: This program allows you to store and manage large amounts of data. 4. **Internet Application**: Internet Explorer is a program that allows you to connect to the Internet and look Web pages. You may have to buy your own software and install them on your computer. In summary, Internet Explorer is a tool for accessing and viewing websites on the Internet. To use it, you need an Internet connection and, in some cases, may need to install the browser on your computer. 1. **Hard Drive**: This storage medium which looks like the computer\'s case. This medium comes with the computer and is already inside the computer. It is one of the most common storage media. In addition, users can add more hard drives. 2. **Floppy Disk**: This storage medium is considered to be a portable storage medium. You can put it into the computer whenever you want to take it out, and you can use it on another computer. 3. **CD & DVD**: These types of storage media hold much more information than floppies. These are also considered portable storage. These types of storage media can also hold video and sound information. There are those that can hold more than one copy since they can hold more information. 4. **USB Flash Drive**: This is a storage medium that is very small and can hold a lot of information. 1. **Keep Clear**: Keep your desk clear to help keep it free of dust and dirt. 2. **Keep Food Away**: Do not eat or drink while working on the computer. 3. **Keep Hands Clean**: Make sure your hands are clean before using the keyboard; do not bang on the keyboard. 4. **Treat With Respect**: If you are having problems with your computer, ask for help. Do not bang on the computer. 5. **Power Off**: Make sure that the computer is connected to a surge protector. This means that lightning could be controlled and you won't damage your computer through the electrical connection. 6. **Virus Attack**: A computer virus is a program, written by a person, that can cause problems for your computer. Be sure to scan your computer for viruses when you save and download files without the protection. **Internet-** This is a global array of computers connected by a high speed reliable network. It connects millions of computers, allowing for the rapid exchange of information's, education military, criminal justice system and business professionals as well as researchers uses the system to send and retrieve information's. It also refers to the technologies that facilitate the transmission of data across the network. **Brief History of Internet** **1960-** Internet was devised as a means to protect the U.S defense infrastructure. RAND CORP. was the one contracted the U.S Department of Defense to create the device. **1964-** RAND Corp. released its recommendations in terms of command and control. The program was known as the Advance Research Project Network (ARPA). **1970**- The ARPA network grew extensively which covers Universities around the U.S military installations and others, with machines of different brands and content but which speaks the ARPA computer language. **1980-** Education, Business and Government Institutions made significant inroads into ARPA. **ARPA** - devised its standards of communications such as; The term \"ARPA\" refers to the Advanced Research Projects Agency, which is now known as DARPA (Defense Advanced Research Projects Agency). ARPA was instrumental in the development of many foundational technologies and standards related to communications, particularly during the 1960s and 1970s. One of its most significant contributions was in the development of protocols and standards that form the backbone of modern computer networking. **NCP -** Network Control Protocol The **Network Control Protocol (NCP)** was an early networking protocol used to allow communication between computers on the ARPANET, which was the precursor to the modern Internet. Developed in the late 1960s and early 1970s, NCP was one of the first protocols designed to manage data transmission between different hosts over the network. NCP was instrumental in proving that computer networks could function effectively and efficiently, enabling the sharing of resources between distant computers. It was a vital step toward the development of more sophisticated protocols like TCP/IP, which now form the basis of the modern Internet. **TCP/IP -** Transmission and Internal Protocol. **TCP/IP**: ARPA played a crucial role in developing the Transmission Control Protocol (TCP) and the Internet Protocol (IP). These protocols were designed to ensure reliable and flexible communication over networks. TCP/IP became the standard suite of protocols for network communications, enabling different networks to interconnect and communicate with each other. **1984-** The National Science Foundation (NSf) installed a network of computers aground the U.S in connection with the ARPA network and is known today as Internet. **1989-** ARPA, ceased into existence and succeeded by the internet. **1997-** Nearly ten million internet service providers (ISPS) maintain host server computers, which anyone with a modem could communicate with. **2000-** Approximately 100 million ISPS are now operating globally. **The World Wide Web -** it is a part of the internet which utilizes a wide variety of features such as graphics, photographs, sounds or video clips. The web utilizes hypertext to link information\'s, to travel electronically from one site to another. **Hypertext** - a web browser text that transmits the user to another website by means of clicking on highlighted text. It provides access to graphics, sounds or video clips.. · **Home Page -** the web page designated as being the first page seen upon entering the website. **Web Browser -** a program that displays text, graphics, audio and visual information. It eliminates the labor of intensive use of E-mail. **Different Types of Internet Connections** There are many ways a personal electronic device can connect to the internet. They are less expensive and each has a range of connection speeds. As technology changes, faster internet connections are needed to handle some of the different types of internet connections that are available for home and personal use, paired with their average speeds. 1. **Dial-Up (Analog 56K)**: Dial-up access is cheap but slow. A modem (internal or external) connects to the Internet after the computer dials a phone number. This analog signal is converted to digital via the modem and sent over a land-line serviced by a public telephone network. Telephone lines are variable in quality and the connection can be poor at times. The lines regularly experience. 2. **DSL**: DSL stands for Digital Subscriber Line. It is an internet connection that is always \"on\". This uses 2 lines so your phone is not tied up when your computer is connected. DSL uses a router to transport data and the range of connection speed, depending on the service offered, is between 128K to 8 Mbps. 3. **Cable**: Cable provides an internet connection through a cable modem and operates over cable TV lines. There are different speeds depending on if you are uploading, providing a much greater bandwidth over dial-up or DSL telephone lines. Since the coax cable telephone lines are used, cable offers faster access. Cable speeds range from 512K to 20 Mbps. 4. **Wireless**: Wireless, or Wi-Fi, as the name suggests, does not use telephone lines or cables to connect to the internet. Instead, it uses radio frequency. Wireless is always an option and can be accessed from just about anywhere. Wireless networks are growing in popularity everywhere. I really mean it. Speeds will vary, and the range is between 5 Mbps to 20 Mbps. 5. **Satellite**: Satellite accesses the internet via a satellite in Earth\'s orbit. The enormous distance that a signal travels from earth to satellite and back again provides a delayed connection compared to cable and DSL. Satellite connection speeds are around 512K to 2.0 Mbps. 6. **Cellular**: Cellular technology provides wireless Internet access through cell phones. The speeds vary depending on the provider, but the most common are 3G and 4G speeds. A 3G is a term that describes a 3rd generation cellular network obtaining mobile speeds of around 2.0 Mbps. 4G is the fourth generation of cellular wireless standards. The goal of 4G is to achieve peak mobile speeds of 100 Mbps but the reality is about 21 Mbps currently. **INTRODUCTION TO CYBER CRIME** **What is Cybercrime?\ **Cybercrime is an activity done using computers and the internet. We can say that it is an unlawful act wherein the computer is either a tool or the target, or both.\ Cybercrime is any crime that takes place online or primarily online. That can run the gamut from identity theft and other security breaches to things like revenge porn, cyberstalking, harassment, bullying, and even child sexual exploitation. Terrorists are collaborating more on the internet, moving these terrifying crimes into cyberspace. General Categories of Cybercrime 1. Computer as a Target 2. Computer as a Weapon History of Cybercrime - **1820-** The first ever recorded cybercrime took place. This is not surprising considering the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan, and China. - 1976- The first spam email was sent out over the ARPANET. - 1982- The first virus was installed on an Apple computer when a high school student, Rich Skrenta, developed the EIK Cloner. - 1981- Ian Murphy, also known as Captain Zap, was the first person to be found guilty of cybercrime. Nature and Scope of Cybercrime - Crime is a socially correlated phenomenon\ The complexity of society determines the complexity of the crime that evolves around it. - Advancement of technology\ Technology has produced new socio-economic and political problems in society, and instead of helping the state control the problem, it has created complex situations that are difficult to understand, and even more difficult to apply current laws to.\ Computers have transformed modern society beyond expectations in the last three to four decades. One difficult aspect is determining jurisdiction in transnational transactions over the internet.\ Cybercrime has become a global phenomenon, and nationwide generalizations of crime cannot work in the present scenario. 5 Characteristics of Cybercrime 1. People with specialized knowledge\ Cybercrimes can only be committed through technology. One has to be very skilled in computers and the internet to commit such crimes. 2. Geographical challenges\ In cyberspace, geographical boundaries are reduced to zero. A cybercriminal in any part of the world can commit a crime in another corner of the world within moments. 3. Virtual World\ Cybercrime takes place in cyberspace, and the criminal who commits this act is physically outside of cyberspace. All their activities occur over the virtual world. 4. Collection of Evidence\ It is very difficult to collect evidence of cybercrime and prove it in a court of law due to its nature. The criminal invokes the jurisdiction of several countries while committing cybercrime and stays safe, where they are not traceable. 5. Magnitude of Crime Unimaginable\ Cybercrime has the potential to cause injury and loss of life on a scale that cannot be imagined. Offenses like cyberterrorism and cyber pornography have a wide reach and can destroy websites, and steal data from companies in no time. TYPES OF CYBERCRIME 1. Cyber Pornography\ The word 'Pornography' is derived from the Greek words 'Porne' and 'Graphein,' meaning writing about prostitutes or dealing with sexual themes. Cyber pornography is defined as using cyberspace to create, display, distribute, import, or publish pornography or obscene materials. Test of Obscenity and Pornography 1. The work depicts or describes sexual conduct in an offensive way, as defined by law. 2. The work lacks serious literary, artistic, political, or scientific value. 3. Community standards of acceptability are used to measure obscenity. 2. Cyber Stalking\ Cyberstalking involves repeatedly harassing or threatening an individual via electronic means.\ There are three ways in which cyberstalking is conducted: Methods used by cyberstalkers: - Collecting victim information from social media. - Posting the victim\'s details on websites related to sexual services. - Sending obscene material through email. - Posting morphed pictures of the victim on pornographic websites. - Sending repetitive emails or calls to the victim. 3. Hacking\ Hacking is considered one of the most serious cybercrimes because it erodes trust in information technology. - Famous hackers include Kevin Mitnick, who hacked the Pentagon, Gary McKinnon, who hacked 90 U.S. military systems, and Vladimir Levin, who hacked Citibank to steal \$10 million. 4. Virus and Contaminants\ Viruses have a long history, beginning with self-replicating programs developed in 1949. - 1981: The Apple viruses 1, 2, and 3 were found on Apple II operating systems. - 1988: The \"Jerusalem\" virus was unleashed, infecting \'.exe\' and \'.com\' files. - 1999: The \"Melissa\" virus infected about one million computers. 5. Financial Crimes - Credit Card Fraud: Criminals steal credit card information to use for their financial gain. - Money Laundering: Disguising financial assets to hide illegal activity. 6. Online Gambling\ Online gambling refers to gambling conducted via the internet, such as virtual poker, online casinos, and sports betting. 7. Intellectual Property Crimes\ These involve the infringement of intellectual property rights, such as counterfeiting and piracy. 8. Email Spoofing\ A technique where attackers disguise themselves as legitimate email senders, commonly used in phishing attacks. 9. Cyber Defamation\ False online statements that harm a person's reputation. 10. Unauthorized Access\ Gaining entry to a system or data without permission. 11. Email Bombing\ A denial-of-service (DoS) attack where large volumes of emails are sent to overwhelm the recipient\'s inbox. 12. Salami Attack\ Involves stealing small amounts of money repeatedly, known as salami slicing or penny shaving. 13. Virus or Worm\ A virus requires a host file to activate and replicate, while a worm spreads automatically without user interaction. 14. Logic Bombs\ Malicious code that activates when specific conditions are met. 15. Trojan Attacks\ Malicious software that masquerades as legitimate applications to deceive users. 16. Web Jacking\ Taking unauthorized control of a website. 17. Cyber Terrorism\ The use of the internet to conduct or threaten violent acts to achieve political or ideological goals.

Use Quizgecko on...
Browser
Browser