Computer Forensics and Cyber Crime Textbook PDF
Document Details
Uploaded by IndebtedOwl
null
2013
Marjie T. Britz
Tags
Related
- Fundamentals of Digital Forensics - Theory, Methods, and Applications PDF
- SEC524 Computer and Network Forensics Lectures 03 and 04 PDF
- King Fahd University Of Petroleum & Minerals Computer Forensics Lectures 05-07 PDF
- Computer Forensics and Cyber Crime PDF
- Computer Forensics And Cyber Crime PDF
- Computer Forensics and Cyber Crime PDF
Summary
This textbook provides an introduction to computer forensics and cybercrime. It explores the various types of computer-related crimes and the challenges to law enforcement, also outlining the societal impact of the digital revolution.
Full Transcript
Computer Forensics and Cyber Crime CHAPTER 1 Introduction and Overview of Computer...
Computer Forensics and Cyber Crime CHAPTER 1 Introduction and Overview of Computer Forensics and Cybercrime Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Introduction Technological change has always led to changes in criminal law. Having a telephone network makes it easy to commit wire fraud. Widespread reliance on automobiles meant a new crime, felony auto theft. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Introduction Widespread Internet use presents new kinds of unacceptable behavior. Enforcing Internet-related crimes poses new challenges for law enforcement. This text explores how law enforcement responds to these challenges. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Learning Objectives Explore the changes in society associated with the advent of technological changes and the introduction of the Internet. Identify the challenges associated with the enforcement and prosecution of computer crime. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Learning Objectives Examine the extent of computer crime in society. Gain familiarity with categories of computer-related crime. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Cyberspace and Criminal Behavior The societal impact of the Digital Revolution is as great as the Industrial Revolution. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Cyberspace and Criminal Behavior Action in the virtual reality of cyberspace can affect physical reality. Organizations like the Electronic Freedom Foundation challenge new criminal laws. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Types of Crime Computer crime: crimes committed with computers Cyber crime: computer crimes that involve the Internet Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Types of Crime Computer-related crime: crimes that in some way use a computer Example: child pornography is easier to spread via the Internet Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Types of Crime INSERT: page 13 box as example Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Problems Associated with Computer Crime Problems associated with computer crime include: Difficulty in law enforcement Difficulty courts face when addressing extra-jurisdictional crime Belief that computer crime is not as dangerous as violent crime Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Problems Associated with Computer Crime Prosecutors may prefer to limit resources on violent crime instead. Lack of reporting arises from a belief that these are not worth pursuing. Law enforcement agencies may lack financial and/or technical resources to investigate computer crimes. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved The Extent of the Problem Crimes can vary by: Type: Those unique to computers, like phreaking Those facilitated by computer use, like distribution of child pornography Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved The Extent of the Problem Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved The Extent of the Problem Crimes can also vary by: Target: Private Government Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved The Extent of the Problem Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Example of a New Cybercrime: The Emergence of e-Cash Increased electronic commerce requires new ways to pay for goods and services. The increased flexibility and utility of these make them appealing. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Example of a New Cybercrime: The Emergence of e-Cash Prepaid cards: like debit cards, not geographically limited Stored value cards: sometimes called electronic purses. Data is on a computer chip. Mobile payments may be transmitted via smartphones. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Example of a New Cybercrime: The Emergence of e-Cash Internet payment services, like PayPal Digital precious metals: value of electronic payments linked to a precious metal Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Conclusions Greater reliance on computer-based technology presents benefits as well as problems. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Conclusions Law enforcement may find it difficult to respond to new types of crimes because of: Lack of resources Difficulty responding to rapid technological change Public perception that computer crime is less serious than violent crime Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved