1 / 21

Computer Forensics BACS 371

Computer Forensics BACS 371. CyberCrime : Background and Motivation. Outline. Categories of Computer Crime Types of CyberCrime Trends in CyberCrime Sources of CyberCrime Stakeholders in CyberCrime Hacker Types and Motivation. Definition of CyberCrime.

silvio
Download Presentation

Computer Forensics BACS 371

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer ForensicsBACS 371 CyberCrime: Background and Motivation

  2. Outline • Categories of Computer Crime • Types of CyberCrime • Trends in CyberCrime • Sources of CyberCrime • Stakeholders in CyberCrime • Hacker Types and Motivation

  3. Definition of CyberCrime CyberCrime is “any violations of criminal law that involve knowledge of computer technology for their perpetration.”

  4. USDOJ Categories1 • Hardware as Contraband or Fruits of a Crime • Hardware as an Instrumentality • Hardware as Evidence • Information as Contraband or Fruits of a Crime • Information as an Instrumentality • Information as Evidence 1 US Dept of Justice, Search and Seizure Guidelines Document

  5. Categories of Computer Crime1 • A computer can be the object of a crime • A computer can be the subject of a crime • The computer can be used as the tool for conducting or planning a crime • Includes… compromising a computer and using that computer as a source for further attacks • The symbol of the computer itself can be used to intimidate or deceive • The most significant omission, according to Casey, is computers as sources of digital evidence 1 from Donn Parker as described in Eoghan Casey, Digital Evidence and Computer Crime

  6. Categories of Computer Crime • Computers as targets • Computers as storage devices • Computers as communication tools Same ole stuff, but computers are involved!!

  7. Categories of Computer Crime cont. • Computers as targets: Attack on the confidentiality, integrity, or availability of a computer’s information or services. • Acquire information on the computer • Control the target system without authorization or payment • Alter integrity of data or interfere with delivery of service

  8. Categories of Computer Crime cont. • Computers as storage devices: Passive storage of information concerning a crime. • Computers as a communication tool: Traditional crimes committed online. Email or chat used to plan a crime.

  9. Types of CyberCrime • DoS and DDoS Attacks • Intellectual Property Theft • Trade secrets • Piracy • Identity Theft • Fraud • Extortion • Cyberstalking • Transmission of Malware • Hacking • Spamming • Sale of Purchase of Narcotics over Internet • Gambling

  10. Trends in CyberCrime • Number of threats targeting enterprises has increased. • Attack toolkits make the crime easier. • Web-based attacks are more numerous. • Emerging countries are having increased activity.

  11. Complaint Type Percentages 2011

  12. Complaint Count 2001 -- 2011

  13. Crime Complaint Categories 2011

  14. Sources of CyberCrimes • Nation-States • Cyberterrorists • Organized crime • Activists • Corporations • Individuals

  15. Stakeholders in Computer Crime • Government/National Security • Government/Customs & Excise • Lawyers • Courts • Police • Businesses • Insurance firms • Corporate crime • International (transnational) crime • Personal (privacy)

  16. Categories of Computer Criminals • Newbies (script kiddies) • Cyberpunks • Internals • Coders • Old guard • Professional criminals • Cyberterrorists

  17. Hacker Types • Thrill-seeker Hackers • White-Hat Hackers • Black-Hat Hackers • Crackers • Hacktivists • Classic Mischievous Kid • Disgruntled Employee • Robber • Ringleader • Social Engineering

  18. Why do Hackers Hack?* • Revenge • Profit • Money and Monetary Tools • Banks • Stocks • Digital Goods • Pride • Intellectual Challenge (Curiosity) * Steven Branigan, High-Tech Crimes Revealed, Addison Wesley, 2005

  19. Opportunities for Cybercriminals • Affordability – Equipment and software becoming cheaper • Acceptable risk – Risk of being caught is relatively low. Small scale criminals often not aggressively prosecuted. • Attractiveness – More available targets. Laws not always current. • Availability – Each Internet access for perp and victim. • Anonymity – Internet gives the illusion of anonymity.

More Related