1 / 16

Computer Forensics and Crime

Computer Forensics and Crime. Group 17 Lewis Hagen. Overview. Computer Crime Cybercrime Types How to Protect Yourself Computer Forensics Business Study Discussion . Computer Crime. Criminal activity where a computer or network is the source, tool, target, or place of a crime.

lerato
Download Presentation

Computer Forensics and Crime

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Forensics and Crime Group 17 Lewis Hagen

  2. Overview Computer Crime • Cybercrime • Types • How to Protect Yourself Computer Forensics • Business Study • Discussion

  3. Computer Crime • Criminal activity where a computer or network is the source, tool, target, or place of a crime. • 2005 – Est. $10B in losses • A majority of computer crime goes unnoticed and is not reported. • Scale

  4. Type of Computer Crimes • Malware/Malicious Code • Computer Virus • Unauthorized access to or modification of programs • Identity theft

  5. Malware • Software designed to infiltrate or damage a computer system without the owner's informed consent. • It includes computer viruses, worms, trojan horses, spyware, dishonest adware, and other malicious and unwanted software.

  6. Unauthorized access to or modification of programs • Hacker • someone involved in computer security/insecurity, specializing in the discovery of exploits in systems (for exploitation or prevention), or in obtaining or preventing unauthorized access to systems through skills, tactics and detailed knowledge

  7. Identity Theft • Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. • Video

  8. How to Protect Yourself • Anti-Virus Software • Norman Virus Control • Norton AntiVirus • McAfee VirusScan Do not open Do not open Suspicious Email ID Protection LifeLock

  9. Computer Forensics • Computer forensics: also called cyberforensics, is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law.

  10. Computer Forensics Steps • Identify sources of digital evidence • Preserve the evidence • Analyze the evidence • Present the findings When would It be used? • Employee internet abuse • Criminal fraud • Identity theft • Unauthorized disclosure of corporate information

  11. Business Study • Disklabs • Global Company Established in 1997 • 'No matter what the computer crime, there will always be incriminating evidence.Computer Forensics will find it.' • Video

  12. What Do you Think? • Do you think Your personal Information Is Safe? • Is It an invasion of your personal rights to have your Computer torn apart?

  13. Where Did I find My information? • Wikipedia • Google • Information Week • Business Week • Disklabs Website • YouTube

  14. Sources • I tried to use current sources when available • Reading #1- Computer Crime followed by **Cybercrime**,,3 March 2008. Reading #2- Searching and Seizing ComputersJuly 2002. Reading #3-FBI Computer Crime Survey18 January 2006 Reading # 4**Internet Crime Prevention Tips** Reading # 5- **An Explanation of Computer Forensics**

  15. Sources I didn’t Use • These Articles were not Outdated and offered only a single narrow opinion. • www.computer-forensic.com/old_site/presentations/ASIS_Presentation.pdf • www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9047900&pageNumber=1

  16. Computer Forensics and Crime • Questions??

More Related