210 likes | 321 Views
Computer Forensics BACS 371. CyberCrime : Background and Motivation. Outline. Categories of Computer Crime Types of CyberCrime Trends in CyberCrime Sources of CyberCrime Stakeholders in CyberCrime Hacker Types and Motivation. Definition of CyberCrime.
E N D
Computer ForensicsBACS 371 CyberCrime: Background and Motivation
Outline • Categories of Computer Crime • Types of CyberCrime • Trends in CyberCrime • Sources of CyberCrime • Stakeholders in CyberCrime • Hacker Types and Motivation
Definition of CyberCrime CyberCrime is “any violations of criminal law that involve knowledge of computer technology for their perpetration.”
USDOJ Categories1 • Hardware as Contraband or Fruits of a Crime • Hardware as an Instrumentality • Hardware as Evidence • Information as Contraband or Fruits of a Crime • Information as an Instrumentality • Information as Evidence 1 US Dept of Justice, Search and Seizure Guidelines Document
Categories of Computer Crime1 • A computer can be the object of a crime • A computer can be the subject of a crime • The computer can be used as the tool for conducting or planning a crime • Includes… compromising a computer and using that computer as a source for further attacks • The symbol of the computer itself can be used to intimidate or deceive • The most significant omission, according to Casey, is computers as sources of digital evidence 1 from Donn Parker as described in Eoghan Casey, Digital Evidence and Computer Crime
Categories of Computer Crime • Computers as targets • Computers as storage devices • Computers as communication tools Same ole stuff, but computers are involved!!
Categories of Computer Crime cont. • Computers as targets: Attack on the confidentiality, integrity, or availability of a computer’s information or services. • Acquire information on the computer • Control the target system without authorization or payment • Alter integrity of data or interfere with delivery of service
Categories of Computer Crime cont. • Computers as storage devices: Passive storage of information concerning a crime. • Computers as a communication tool: Traditional crimes committed online. Email or chat used to plan a crime.
Types of CyberCrime • DoS and DDoS Attacks • Intellectual Property Theft • Trade secrets • Piracy • Identity Theft • Fraud • Extortion • Cyberstalking • Transmission of Malware • Hacking • Spamming • Sale of Purchase of Narcotics over Internet • Gambling
Trends in CyberCrime • Number of threats targeting enterprises has increased. • Attack toolkits make the crime easier. • Web-based attacks are more numerous. • Emerging countries are having increased activity.
Sources of CyberCrimes • Nation-States • Cyberterrorists • Organized crime • Activists • Corporations • Individuals
Stakeholders in Computer Crime • Government/National Security • Government/Customs & Excise • Lawyers • Courts • Police • Businesses • Insurance firms • Corporate crime • International (transnational) crime • Personal (privacy)
Categories of Computer Criminals • Newbies (script kiddies) • Cyberpunks • Internals • Coders • Old guard • Professional criminals • Cyberterrorists
Hacker Types • Thrill-seeker Hackers • White-Hat Hackers • Black-Hat Hackers • Crackers • Hacktivists • Classic Mischievous Kid • Disgruntled Employee • Robber • Ringleader • Social Engineering
Why do Hackers Hack?* • Revenge • Profit • Money and Monetary Tools • Banks • Stocks • Digital Goods • Pride • Intellectual Challenge (Curiosity) * Steven Branigan, High-Tech Crimes Revealed, Addison Wesley, 2005
Opportunities for Cybercriminals • Affordability – Equipment and software becoming cheaper • Acceptable risk – Risk of being caught is relatively low. Small scale criminals often not aggressively prosecuted. • Attractiveness – More available targets. Laws not always current. • Availability – Each Internet access for perp and victim. • Anonymity – Internet gives the illusion of anonymity.