Documente Academic
Documente Profesional
Documente Cultură
Classification of crimes
o Digital crimes
o Virus used as a tool
o Crimes IN machine, crimes using the machine, crimes against the machines
A. Traditional crime via computer - computer is the instrument for doing something that can
be done by other means .. Such as ?
Such crimes can occur without computers and networks Often involves a "social
engineering" aspect with computers
B. Computer misuse crimes - computers are more centrally involved, perhaps the target
Computer network is often the target Usually involves…
Theft of data
Phishing
Identity theft
Harassment
Stock market
Tangible to intangible carries potential for great harm because the spatial and temporal
constraints of physical world no longer apply
Cyber crimes usually not reported by organizations because of the impact on their
reputation
International Efforts
o Child pornography
o And violation of network security
Content-related offences
o Production orders
o Search and seizure of stored computer data
Use of electronic gadgets to access control or manipulate and use data for illegal purposes
Classification of Crimes:
Regulation:
Physical: Gov can control or regulate in the same way as phone systems, require to be intercept
able
Code: enables and restricts certain behavior, i.e. blocking software, filters, firewalls etc.
Content: real space laws regulate cyber space, e.g. speech
Examples of crime are: financial crime, online gambling, IP crime, email spoofing
Ex: Trojan attacks, theft of computer system, physical damage, email bombing
Identity theft is against law in Canada, criminal code 342 and bill s-4 created offences 402.1 ..
Tobok lecture:
Threats: • State-sponsored hacking and espionage • Theft of intellectual property • Costs of Cyber
Crime, Trends, Damages and expansion • Organized Crime and Cyber crime • Risk To Corporations
Costs of cyber crime 2013: $100 billion (Wall Street Journal est.) 2015: $400 billion (Lloyd’s Insurance
est.) By 2019: $2.1 trillion (Juniper Networks est.)
Cost of technology is dropping, cheap to buy malware kits, key loggers, viruses etc
VENTURELAB Lecture:
Fred Carter
Fred Carter Senior Policy & Technology Advisor Office of the Information and Privacy Commissioner of
Ontario (IPC)
Information privacy refers to the right or ability of individuals to exercise control over the collection, use
and disclosure by others of their personal information • Personally-identifiable information (“PII”) can
be biographical, biological, genealogical, historical, transactional, locational, relational, computational,
vocational or reputational, and is the stuff that makes up our modern identity
Privacy Risks • Fraud and security concerns are inhibiting confidence, trust, and the growth of e-
commerce, e-government • Fears of surveillance and excessive collection, use and disclosure of personal
information by others are also diminishing confidence and use • Lack of individual user empowerment
and control
Principles of Fair Information Practices (FIPPs) • Based upon the 1980 OECD principles: 1. Collection
limitation • Informed consent 2. Data quality 3. Purpose specification 4. Use limitation 5. Security
safeguards 6. Openness 7. Individual participation • Individual access and challenging compliance 8.
Accountability