SlideShare uma empresa Scribd logo
1 de 67
Computer Crime Scope of the problem
Computer Crime: Background ,[object Object],[object Object]
Computer Crime: Background The accounting firm of Ernst & Young estimates that computer-related crime cost U.S. businesses about $3 billion to $5 billion a year in losses. Other researchers put the total loss figure as high as $40 billion if losses from Viruses and Software Piracy are included.
Computer Crime: Background Only 6% to 11% of computer crime is reported. Of this segment, only 2% of the cases resulted in a conviction requiring any jail time. Less than a dozen computer criminals nationwide have served any time.
Computer Crime: Background Average insured losses resulting from exploitation and tampering of computer systems are in the range of $500,000 - $600,000.
Computer Crime: Background 75% to 80% of all computer crime is traceable to trusted insiders who had legitimate computer access, and/or knowledge of how operational procedures could be manipulated to their financial benefit.
Computer Crime: Background Key motivational factors driving insider actions are: - lax security - revenge aimed at management.
Computer Crime: Background Average bank robber: $5K / 90% / 7 yrs hard time vs. Computer criminal: $600K / 2%/ 2 yrs min. security
Computer Crime: Background Normal computer crime takes less than one second to pull off, and is usually done from  another state or foreign country.
Computer Crime: Background A 1989 study by the National Center for Computer Crime Data of 3,500 companies found an average loss of $110,000, 365 man-hours, and 26 hours of computer time for each computer crime event discovered. 70% of all events involved theft of money or services.
Computer Crime: Background When a computer criminal is caught, it is "because such a large sum of money is taken that even the most ill-prepared system will note the anomaly."   (Donn Parker. SRI computer crime expert)
Computer Crime: Background "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than a bomb." "To date, we have been remarkably lucky... Unfortunately, there is reason to believe that our luck will soon run out."
Computer Crime: Background "The committee is concerned that the development of legislation and case law is being outpaced by the growth of technology and changes in our society."  (Source: Computers At Risk, National Research Council, 1991)
Computer Crime: Insider Examples Stanley Mark Rifkin hits Security Pacific Bank for  $10.2 million using EFT passwords he observed pasted to terminals in the money transfer room of the bank. ('78)
Computer Crime: Insider Examples A New York brokerage firm disables the audit trail on their computer system to speed up operations. Shortly after, a clerk disappears to Switzerland with an estimated $28.8 million. ('86)
Computer Crime: Insider Examples The computer program that Volkswagen of West Germany used to control its international finance operations was altered so that 5 high-level executives got away with $260 million. No charges filed, but all fired! ('87)
Computer Crime: Insider Examples A London bank releases a press statement claiming their banks are not vulnerable to fraud the same day 4 persons are arrested with 1,864 valid, but forged, ATM cards in their possession. ('87)
Computer Crime: Insider Examples  Seven New York men use stolen EFT codes to  embezzle S70 million from the bank accounts of  Merrill-Lynch and United Airlines. They are caught only after they cause Merrill-Lynch's account to be overdrawn. ('88)
Computer Crime: Insider Examples A Delaware state lottery computer system  malfunctions, allowing unscrupulous lottery vendors to help themselves to $555,000 in winning tickets after the numbers had already been drawn. ('89)
Computer Crime: Insider Examples The Washington State prison system suspends a  program where inmates were allowed to keep PCs in their cells, citing security issues after one prison's main computer system experienced unusual problems. ('89)
Computer Crime: Insider Examples 18 inmates working as data entry operators at the Tennessee State Prison guess the password to a payroll system and give themselves raises ranging from $20 to $500 a month. ('90)
Computer Crime: Insider Examples U.S. Attorney's Office in Kentucky sells computer at surplus auction for $45, and then realizes that 7 years worth of data on Federal Agents and Witness Protection participants were not erased. ('90)
Computer Crime: Insider Examples Laptop computer is stolen from Wing Commander of British military. On the laptop were classified plans for Persian Gulf war. Returned 4 days later in the mail. ('91)
Computer Crime: Insider Examples Four Cal Poly University students are arrested after charging $250,000 in goods to MasterCard and Visa cards. They gained access to Equifax, and copied some 1,600 credit reports. They then used the good credit-card numbers to re-program the magnetic data on stolen credit cards. They did this from a laptop in their car. ('91)
Computer Crime: Hacker History ,[object Object],[object Object],[object Object]
Computer Crime: Hacker History ,[object Object],[object Object],[object Object]
Computer Crime: Hacker Profile Profile of a typical hacker is a white or Asian male,  age 14 to 20, with average to below-average grades, an introvert who does not relate well to even his peers, has no father in the home, and has a personal life that is severely disorganized.
Computer Crime: Hacker Profile Hackers will spend 200 to 300 hours a month on the phone exchanging messages with other hackers, as well as trying to gain entry to computer systems world wide.
Computer Crime: Malicious Hackers AF-OSI nabs 14 year old for hacking into computers at the Pentagon and downloading several unclassified documents. Use of an "800" number allowed him to be traced. ('89)
Computer Crime: Malicious Hackers Kevin Mitnick, the "Darth Vader of Hackers,"  hacks into DEC and copies the security software (loss, $4 million) they use to protect their systems. When arrested, he had 16 stolen MCI codes in his possession. He also shut down 911 service in California ('89)
Computer Crime: Malicious Hackers  Republican Party staff member from New Jersey hacks into the Democratic Party computer system and copies confidential files. Files showed that state workers were using state time for campaign work. ('90)
Computer Crime: Malicious Hackers The Legion of Doom is credited with planting a virus in the AT&T Switching Network. The system was down for 9 hours. 25 million long distance phone calls get busy signal.  (Jan 15, 1990 - MLK holiday)
Computer Crime: Malicious Hackers Johnson Space Center denies it has lost $12 million over two years due to abuse of their phone system. One stolen access code was distributed to hundreds of hackers. ('90)
Computer Crime: Malicious Hackers Leslie Lynne Douchette (AKA, Kyrie), ring-leader of nationwide group of hackers, is sentenced to 27 months. Losses directly tied to her pivot on 481 MCI access codes in her possession that accounted for S595,000 in long-distance phone fraud. ('90)
Computer Crime: Malicious Hackers "Hacker Heaven": Belgium, Greece, Italy and the Netherlands. As of August 1991, they had no laws that made unauthorized access/tampering of computers a crime.
Computer Crime: Malicious Hackers U.S. vendor of secure modems issues challenge to hackers: "Hack into my system and I will give you cash reward." 8,000 hackers tried. ('91)
Computer Crime: Viruses & Worms ,[object Object],[object Object]
Computer Crime: Viruses & Worms The goal of both viruses and worms is to replicate themselves. They may, or may-not trigger on some external event that causes them to be annoying or destructive.
Computer Crime: Viruses & Worms ,[object Object],[object Object]
Computer Crime: Viruses & Worms The public attitude toward viruses is changing. They are now seen as a bizarre form of industrial sabotage, rather than a technological version of a practical joke.
Computer Crime: Viruses & Worms "Christmas Tree" virus forces IBM to shut down 350,000 internal communications networks world- wide for nearly three days to permit location and removal of the virus. ('87)
Computer Crime: Viruses & Worms The Internet Unix worm, written by Robert Morris, caused 6,200 computer systems to crash, it took 1 million hours to repair the damage, at an estimated cost of $97 million.
Computer Crime: Viruses & Worms Convicted, Morris could have gotten five years and a $250,000 fine, but instead a U.S. District Court Judge gave him  400 hours  of community service, a  $10,000 fine  and  3 years probation . ('88)
Computer Crime: Viruses & Worms ,[object Object],[object Object]
Computer Crime: Viruses & Worms One of the most common viruses, the "Friday the 13th," was written by a programmer in the Middle East as a protest against the 40-year anniversary of the founding of Israel.
Computer Crime: Pedophiles ,[object Object],[object Object],[object Object]
Computer Crime: Pedophiles Medford, Massachusetts Police raided a child pornography video operation and discovered a major computer BBS network. There were over 1,000 users on the system from across the U.S. , and many international users. (‘90)
Computer Crime: Pedophiles Alameda County, California District Attorney’s Office prosecuted two males on pedophilia-related charges after an investigation revealed the suspects were running a travel service for pedophiles to Thailand. The contact information was kept in Casio databank watches. (‘86)
Computer Crime: Pedophiles The pedophile victim profile is very similar to the computer hacker profile, making electronic networks a fertile hunting ground for pedophiles.
Computer Crime: Pedophiles Mr. Roger Deitz of Fremont, California told newspapers and TV stations that he posed as a 13 year old homosexual male and was able to make contact with 20 - 30 pedophiles using America  On-Line service. The service is assisting the FBI in a subsequent investigation but does not monitor private E-Mail. (New York Times 3/92)
Computer Crime: Pedophiles A San Jose, California detective posing as a pedophile on a BBS system was solicited by pedophiles Dean Lambey and Daniel Depew to participate in a kidnapping and "snuff flick" of a 12-year-old. FBI officials arrested both Lambey and Depew when they made an overt act to further the conspiracy. (Los Angeles Times 10/91)
Data Diddling ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Diddling: Attack Points ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Diddling: Examples ,[object Object],[object Object],[object Object]
Data diddling: Detection ,[object Object],[object Object],[object Object]
Trojan horse: Definition The covert placement of computer instructions in a program so that the computer will perform unauthorized functions. But usually still will allow the basic program to perform its intended purpose
Trojan horse: Common method for prevention or detection ,[object Object],[object Object],[object Object]
Trojan horse: Detection ,[object Object]
Trojan horse: Sources  ,[object Object],[object Object],[object Object],[object Object]
Salami Technique: Definition ,[object Object],[object Object],[object Object],[object Object]
Salami Technique:  Most common targets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Salami Technique: Detection ,[object Object],[object Object],[object Object],[object Object],[object Object]
Superzapping A program that permits the user to bypass all normal system controls. It makes possible the disclosure and/or modification of any program or data resident in the system.
Trap Doors/Back doors Computer instructions (part of a program) that allows users to access the program and/or data without initializing the program in the normal fashion. (Go in the back door)
Logic bomb Special unauthorized instruction imbedded in computer routines that determine process conditions or system status.
Scavenging: Definition Obtaining information that may be resident in or around a computer system
Scavenging: Sources ,[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
solomon24
 

Mais procurados (20)

Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Shilpa
ShilpaShilpa
Shilpa
 
Cyber law
Cyber law Cyber law
Cyber law
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 

Destaque

Business Crime Research Assignment FC
Business Crime Research Assignment FCBusiness Crime Research Assignment FC
Business Crime Research Assignment FC
Melissa Gibson
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
Charmaine Servado
 

Destaque (12)

Legal500
Legal500Legal500
Legal500
 
Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?
 
Tackling Financial Crime through Business Process Management
Tackling Financial Crime through Business Process ManagementTackling Financial Crime through Business Process Management
Tackling Financial Crime through Business Process Management
 
The International Comparative Legal Guide to: Business Crime 2017
The International Comparative Legal Guide to: Business Crime 2017The International Comparative Legal Guide to: Business Crime 2017
The International Comparative Legal Guide to: Business Crime 2017
 
Business Crime Research Assignment FC
Business Crime Research Assignment FCBusiness Crime Research Assignment FC
Business Crime Research Assignment FC
 
Crime Unit
Crime UnitCrime Unit
Crime Unit
 
Global Economic Crime Survey
Global Economic Crime SurveyGlobal Economic Crime Survey
Global Economic Crime Survey
 
Crime in the Business World
Crime in the Business WorldCrime in the Business World
Crime in the Business World
 
Chapter 2 Criminology
Chapter 2 CriminologyChapter 2 Criminology
Chapter 2 Criminology
 
The International Comparative Legal Guide to Business Crime 2016
The International Comparative Legal Guide to Business Crime 2016The International Comparative Legal Guide to Business Crime 2016
The International Comparative Legal Guide to Business Crime 2016
 
Bribery and Corruption
Bribery and CorruptionBribery and Corruption
Bribery and Corruption
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 

Semelhante a L Scope

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
sunnysmith
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
bkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
write12
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 

Semelhante a L Scope (20)

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Unit 1
Unit 1Unit 1
Unit 1
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
 

Mais de CTIN

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
CTIN
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
CTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
CTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
CTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
CTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
CTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
CTIN
 
Nra
NraNra
Nra
CTIN
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
CTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
CTIN
 
Edrm
EdrmEdrm
Edrm
CTIN
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
CTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
CTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
CTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
CTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
CTIN
 

Mais de CTIN (20)

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Nra
NraNra
Nra
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Edrm
EdrmEdrm
Edrm
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 

Último

VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
dipikadinghjn ( Why You Choose Us? ) Escorts
 

Último (20)

VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
 
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
 
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
 
Top Rated Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
 
Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
Shrambal_Distributors_Newsletter_Apr-2024 (1).pdf
Shrambal_Distributors_Newsletter_Apr-2024 (1).pdfShrambal_Distributors_Newsletter_Apr-2024 (1).pdf
Shrambal_Distributors_Newsletter_Apr-2024 (1).pdf
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
 
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdf
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 

L Scope

  • 1. Computer Crime Scope of the problem
  • 2.
  • 3. Computer Crime: Background The accounting firm of Ernst & Young estimates that computer-related crime cost U.S. businesses about $3 billion to $5 billion a year in losses. Other researchers put the total loss figure as high as $40 billion if losses from Viruses and Software Piracy are included.
  • 4. Computer Crime: Background Only 6% to 11% of computer crime is reported. Of this segment, only 2% of the cases resulted in a conviction requiring any jail time. Less than a dozen computer criminals nationwide have served any time.
  • 5. Computer Crime: Background Average insured losses resulting from exploitation and tampering of computer systems are in the range of $500,000 - $600,000.
  • 6. Computer Crime: Background 75% to 80% of all computer crime is traceable to trusted insiders who had legitimate computer access, and/or knowledge of how operational procedures could be manipulated to their financial benefit.
  • 7. Computer Crime: Background Key motivational factors driving insider actions are: - lax security - revenge aimed at management.
  • 8. Computer Crime: Background Average bank robber: $5K / 90% / 7 yrs hard time vs. Computer criminal: $600K / 2%/ 2 yrs min. security
  • 9. Computer Crime: Background Normal computer crime takes less than one second to pull off, and is usually done from another state or foreign country.
  • 10. Computer Crime: Background A 1989 study by the National Center for Computer Crime Data of 3,500 companies found an average loss of $110,000, 365 man-hours, and 26 hours of computer time for each computer crime event discovered. 70% of all events involved theft of money or services.
  • 11. Computer Crime: Background When a computer criminal is caught, it is "because such a large sum of money is taken that even the most ill-prepared system will note the anomaly." (Donn Parker. SRI computer crime expert)
  • 12. Computer Crime: Background "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than a bomb." "To date, we have been remarkably lucky... Unfortunately, there is reason to believe that our luck will soon run out."
  • 13. Computer Crime: Background "The committee is concerned that the development of legislation and case law is being outpaced by the growth of technology and changes in our society." (Source: Computers At Risk, National Research Council, 1991)
  • 14. Computer Crime: Insider Examples Stanley Mark Rifkin hits Security Pacific Bank for $10.2 million using EFT passwords he observed pasted to terminals in the money transfer room of the bank. ('78)
  • 15. Computer Crime: Insider Examples A New York brokerage firm disables the audit trail on their computer system to speed up operations. Shortly after, a clerk disappears to Switzerland with an estimated $28.8 million. ('86)
  • 16. Computer Crime: Insider Examples The computer program that Volkswagen of West Germany used to control its international finance operations was altered so that 5 high-level executives got away with $260 million. No charges filed, but all fired! ('87)
  • 17. Computer Crime: Insider Examples A London bank releases a press statement claiming their banks are not vulnerable to fraud the same day 4 persons are arrested with 1,864 valid, but forged, ATM cards in their possession. ('87)
  • 18. Computer Crime: Insider Examples Seven New York men use stolen EFT codes to embezzle S70 million from the bank accounts of Merrill-Lynch and United Airlines. They are caught only after they cause Merrill-Lynch's account to be overdrawn. ('88)
  • 19. Computer Crime: Insider Examples A Delaware state lottery computer system malfunctions, allowing unscrupulous lottery vendors to help themselves to $555,000 in winning tickets after the numbers had already been drawn. ('89)
  • 20. Computer Crime: Insider Examples The Washington State prison system suspends a program where inmates were allowed to keep PCs in their cells, citing security issues after one prison's main computer system experienced unusual problems. ('89)
  • 21. Computer Crime: Insider Examples 18 inmates working as data entry operators at the Tennessee State Prison guess the password to a payroll system and give themselves raises ranging from $20 to $500 a month. ('90)
  • 22. Computer Crime: Insider Examples U.S. Attorney's Office in Kentucky sells computer at surplus auction for $45, and then realizes that 7 years worth of data on Federal Agents and Witness Protection participants were not erased. ('90)
  • 23. Computer Crime: Insider Examples Laptop computer is stolen from Wing Commander of British military. On the laptop were classified plans for Persian Gulf war. Returned 4 days later in the mail. ('91)
  • 24. Computer Crime: Insider Examples Four Cal Poly University students are arrested after charging $250,000 in goods to MasterCard and Visa cards. They gained access to Equifax, and copied some 1,600 credit reports. They then used the good credit-card numbers to re-program the magnetic data on stolen credit cards. They did this from a laptop in their car. ('91)
  • 25.
  • 26.
  • 27. Computer Crime: Hacker Profile Profile of a typical hacker is a white or Asian male, age 14 to 20, with average to below-average grades, an introvert who does not relate well to even his peers, has no father in the home, and has a personal life that is severely disorganized.
  • 28. Computer Crime: Hacker Profile Hackers will spend 200 to 300 hours a month on the phone exchanging messages with other hackers, as well as trying to gain entry to computer systems world wide.
  • 29. Computer Crime: Malicious Hackers AF-OSI nabs 14 year old for hacking into computers at the Pentagon and downloading several unclassified documents. Use of an "800" number allowed him to be traced. ('89)
  • 30. Computer Crime: Malicious Hackers Kevin Mitnick, the "Darth Vader of Hackers," hacks into DEC and copies the security software (loss, $4 million) they use to protect their systems. When arrested, he had 16 stolen MCI codes in his possession. He also shut down 911 service in California ('89)
  • 31. Computer Crime: Malicious Hackers Republican Party staff member from New Jersey hacks into the Democratic Party computer system and copies confidential files. Files showed that state workers were using state time for campaign work. ('90)
  • 32. Computer Crime: Malicious Hackers The Legion of Doom is credited with planting a virus in the AT&T Switching Network. The system was down for 9 hours. 25 million long distance phone calls get busy signal. (Jan 15, 1990 - MLK holiday)
  • 33. Computer Crime: Malicious Hackers Johnson Space Center denies it has lost $12 million over two years due to abuse of their phone system. One stolen access code was distributed to hundreds of hackers. ('90)
  • 34. Computer Crime: Malicious Hackers Leslie Lynne Douchette (AKA, Kyrie), ring-leader of nationwide group of hackers, is sentenced to 27 months. Losses directly tied to her pivot on 481 MCI access codes in her possession that accounted for S595,000 in long-distance phone fraud. ('90)
  • 35. Computer Crime: Malicious Hackers "Hacker Heaven": Belgium, Greece, Italy and the Netherlands. As of August 1991, they had no laws that made unauthorized access/tampering of computers a crime.
  • 36. Computer Crime: Malicious Hackers U.S. vendor of secure modems issues challenge to hackers: "Hack into my system and I will give you cash reward." 8,000 hackers tried. ('91)
  • 37.
  • 38. Computer Crime: Viruses & Worms The goal of both viruses and worms is to replicate themselves. They may, or may-not trigger on some external event that causes them to be annoying or destructive.
  • 39.
  • 40. Computer Crime: Viruses & Worms The public attitude toward viruses is changing. They are now seen as a bizarre form of industrial sabotage, rather than a technological version of a practical joke.
  • 41. Computer Crime: Viruses & Worms "Christmas Tree" virus forces IBM to shut down 350,000 internal communications networks world- wide for nearly three days to permit location and removal of the virus. ('87)
  • 42. Computer Crime: Viruses & Worms The Internet Unix worm, written by Robert Morris, caused 6,200 computer systems to crash, it took 1 million hours to repair the damage, at an estimated cost of $97 million.
  • 43. Computer Crime: Viruses & Worms Convicted, Morris could have gotten five years and a $250,000 fine, but instead a U.S. District Court Judge gave him 400 hours of community service, a $10,000 fine and 3 years probation . ('88)
  • 44.
  • 45. Computer Crime: Viruses & Worms One of the most common viruses, the "Friday the 13th," was written by a programmer in the Middle East as a protest against the 40-year anniversary of the founding of Israel.
  • 46.
  • 47. Computer Crime: Pedophiles Medford, Massachusetts Police raided a child pornography video operation and discovered a major computer BBS network. There were over 1,000 users on the system from across the U.S. , and many international users. (‘90)
  • 48. Computer Crime: Pedophiles Alameda County, California District Attorney’s Office prosecuted two males on pedophilia-related charges after an investigation revealed the suspects were running a travel service for pedophiles to Thailand. The contact information was kept in Casio databank watches. (‘86)
  • 49. Computer Crime: Pedophiles The pedophile victim profile is very similar to the computer hacker profile, making electronic networks a fertile hunting ground for pedophiles.
  • 50. Computer Crime: Pedophiles Mr. Roger Deitz of Fremont, California told newspapers and TV stations that he posed as a 13 year old homosexual male and was able to make contact with 20 - 30 pedophiles using America On-Line service. The service is assisting the FBI in a subsequent investigation but does not monitor private E-Mail. (New York Times 3/92)
  • 51. Computer Crime: Pedophiles A San Jose, California detective posing as a pedophile on a BBS system was solicited by pedophiles Dean Lambey and Daniel Depew to participate in a kidnapping and "snuff flick" of a 12-year-old. FBI officials arrested both Lambey and Depew when they made an overt act to further the conspiracy. (Los Angeles Times 10/91)
  • 52.
  • 53.
  • 54.
  • 55.
  • 56. Trojan horse: Definition The covert placement of computer instructions in a program so that the computer will perform unauthorized functions. But usually still will allow the basic program to perform its intended purpose
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63. Superzapping A program that permits the user to bypass all normal system controls. It makes possible the disclosure and/or modification of any program or data resident in the system.
  • 64. Trap Doors/Back doors Computer instructions (part of a program) that allows users to access the program and/or data without initializing the program in the normal fashion. (Go in the back door)
  • 65. Logic bomb Special unauthorized instruction imbedded in computer routines that determine process conditions or system status.
  • 66. Scavenging: Definition Obtaining information that may be resident in or around a computer system
  • 67.

Notas do Editor

  1. File Name: Scope.ppt This presentation provides the student with an overview of the computer crime problem.