Documente Academic
Documente Profesional
Documente Cultură
Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime
Cyber Crimes
It is a criminal activity committed on the internet. This is a broad term that describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to lose money.
Another Definition
Crimes where a computer is the target of the crime, Crimes where a computer is a tool of the crime, and Crimes where a computer is incidental to the commission of the crime.
Silent in Nature Global in character Non existence of Physical Evidence Creates high Impact High Potential and Easy to Perpetrate
Cyber crimes against persons. Cyber crimes against property. Cyber crimes against government.
Cybercrimes committed against persons include various crimes Transmission of pornography Harassment of any one The trafficking, distribution, posting, and dissemination of X-rated material Threats to some ones privacy
The second category of Cyber-crimes is that of Cybercrimes against all forms of property. These crimes include computer vandalism (destruction of others' property), transmission of harmful programs. Threats to hardware and data
Cyber terrorism Attack on Govt. web sites Attack on Military web sites Cyberspace individuals and groups to threaten the international governments "cracks" into a government or military maintained website.
CYBERCRIME GRAPH
12 10 8 6 4 2 0 2000
2001
2002
2003
2004
Defination actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.
Cyber War
Pentagon has formally recognized cyberspace as a new domain in warfare critical to military operations as land, sea, air, and space. China has plans of winning informationised wars by the mid-21st century
Cyber War
countries are likewise organizing for cyber war, among them are Russia, Israel and North Korea Iran claims of having the worlds secondlargest cyber-army. U.S. has a severe shortage of computer security specialists
only about 1,000 qualified people in the country but needs a force of 20,000 to 30,000 skilled experts Pakistan ????
The unique process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally accepted.
CYBER FORENSICS
IS
TECHNOLOGY IS CHANGING RAPIDLY CYBER CRIMES ARE ALSO CHANGING RAPIDLY SYSTEMS AND CRIMES EVOLVE MORE RAPIDLY THAN THE TOOLS THAT EXAMINE THEM
TECHNICAL
NEW METHODOLOGIES
NEW TOOLS
OBSOLESENCE
OPERATIONAL
IT RESULTS IN UNCERTAINITIES ABOUT EFFECTIVENESS OF CURRENT INVESTIGATION TECHNIQUES SUB OPTIMAL USE OF RESOURCES PRIVACY CONCERNS
SOCIAL
USE & BOUNDS OF DIGITAL EVIDENCE IN LEGAL PROCEDURES STILL UNCLEAR CURRENT TOOLS & TECHNIQUES NOT RIGOROUSLY USED / CONTESTED IN COURT
LEGAL
TYPICAL TOOLS
Use anti-virus software and firewalls - keep them up to firewalls - keep them up to date Keep your operating system up to date with critical security updates and patches Don't open emails or attachments from unknown source Don't share access to your computers with strangers If you have a Wi-Fi network, password protect it Disconnect from the Internet when not in use
"The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb".
National Research Council
Click to edit Master text styles Second level Third level Fourth level Fifth level
Questions??