Full Transcript

Computer Forensics and Cyber Crime CHAPTER 4 Contemporary Computer Crime Computer Fore...

Computer Forensics and Cyber Crime CHAPTER 4 Contemporary Computer Crime Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz Public All Rights Reserved Learning Objectives Explore the current state of Internet crimes in the United States and abroad. Identify emerging trends in web-based crime. Develop a working knowledge of the six classifications of motive for modern computer intruders. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz Public All Rights Reserved Learning Objectives Become familiar with more computer terms and recent laws that aid the government in cracking down on computer criminals. Gain knowledge of modern terrorists and their use of technology which is changing the face of terrorism completely. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz Public All Rights Reserved Web-Based Criminal Activity Computer crime can involve more than Internet-based activities:  Financial losses  Threats to personal security (i.e., identity theft)  Industrial espionage  Threats to international security  Threats to public safety Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz Public All Rights Reserved Web-Based Criminal Activity Online crime, however, can include:  Interference with lawful use of computers, such as eco-terrorism, DOS attacks, use of malware (e.g., viruses, worms) malware, cyber vandalism, cyber terrorism, spam, etc.  Theft of information and copyright infringement, such as industrial espionage, ID theft, and ID fraud. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz Public All Rights Reserved Web-Based Criminal Activity Dissemination of contraband or offensive materials, such as pornography, child pornography, online gaming, and treasonous or racist material Threatening communications, such as extortion, cyber stalking, cyber harassment, and cyber bullying Fraud, such as auction fraud, credit card fraud, theft of services, and stock manipulation Ancillary crimes, such as money laundering and conspiracy Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz Public All Rights Reserved Malware: Viruses Viruses, their design, and dissemination, have gone through different phases:  Classical Era (1960s–1970s): Involved pranks or were accidentally distributed  Floppy Era (1980s–1990s): Targeted DOS machines; primarily distributed via floppy disks  Macro Era (1990s–2000s): Infected documents and templates, rather than programs  Internet Era (2000–present): More sophisticated, seeking out vulnerable systems Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz Public All Rights Reserved Malware: Worms, DoS, and Botnets Worms seem primarily used to set up a large-scale DoS attack. DoS (Denial of Service) and DDOS (Distributed Denial of Service) Attacks  Attempt to overwhelm servers, such as through mail-bombing. Botnets and Zombie Armies  Using zombies, compromised computers linked to Internet as an army (or botnet), for theft, extortion, or DDOS attack, for example. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz Public All Rights Reserved Malware: Spam Spam  Abuse of electronic messaging systems, taking up resources, across multiple platforms Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz Public All Rights Reserved Malware: Ransomware Ransomware and the Kidnapping of Information  Malware program that makes digital resources inoperable or inaccessible in extortive scheme  Critical factors can include level of user's education (less educated, more vulnerable), sophistication of product (not amenable to common software remedies) Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz Public All Rights Reserved Malware: Ransomware  Examples include the PC Cyborg/Aids information Trojan, distributed through ordinary mail via a floppy, so that once installed, victims had to pay $378 to regain access to all directories and to unencrypt files. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz Public All Rights Reserved Theft of Information, Data Manipulation, and Web Encroachment Traditional methods of proprietary information theft can occur due to:  Insiders, on the job or through maintenance back doors  Social engineering, including shoulder surfing and dumpster diving  Theft of equipment  Malware Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz Public All Rights Reserved Theft of Information, Data Manipulation, and Web Encroachment Trade Secrets and Copyrights – Concerns:  These forms of intellectual property have value independent of whatever owner produces, such as a razor company designing a new shaving system.  Theft can come from disgruntled employees, competitors, and government entities. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz Public All Rights Reserved Theft of Information, Data Manipulation, and Web Encroachment Political Espionage – Seriousness:  FBI estimates that over 120 foreign governments have intelligence operations targeting the U.S.  For example, Israeli intelligence secretly monitored Presidential communications. SEARCH (2000). The Investigation of Computer Crime. The National Consortium for Justice Information and Statistics: Sacramento, CA. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz Public All Rights Reserved Cyber Terrorism A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems which is intended to disrupt and/or deny service or acquire information which disrupts the social, physical, or political infrastructure of a target. Typical array of methods, like viruses and worms, against U.S. government Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz Public All Rights Reserved

Use Quizgecko on...
Browser
Browser