Sunteți pe pagina 1din 27

Cyber Crimes & Cyber war

Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime

Cyber Crimes

It is a criminal activity committed on the internet. This is a broad term that describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to lose money.

Another Definition

Crimes where a computer is the target of the crime, Crimes where a computer is a tool of the crime, and Crimes where a computer is incidental to the commission of the crime.

What is Cyber Crime?

Silent in Nature Global in character Non existence of Physical Evidence Creates high Impact High Potential and Easy to Perpetrate

Characteristics of Cyber Crime

Cyber crimes against persons. Cyber crimes against property. Cyber crimes against government.

Categories of Cyber Crimes

NEITHER FORWARD.. NOR BACKWARD.. BUT AWKWARD:

CYBER CRIMES ARE

Cybercrimes committed against persons include various crimes Transmission of pornography Harassment of any one The trafficking, distribution, posting, and dissemination of X-rated material Threats to some ones privacy

Cybercrimes against persons

The second category of Cyber-crimes is that of Cybercrimes against all forms of property. These crimes include computer vandalism (destruction of others' property), transmission of harmful programs. Threats to hardware and data

Cybercrimes against property

Cyber terrorism Attack on Govt. web sites Attack on Military web sites Cyberspace individuals and groups to threaten the international governments "cracks" into a government or military maintained website.

Cybercrimes against government

CYBERCRIME GRAPH
12 10 8 6 4 2 0 2000

2001

2002

2003

2004

Defination actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.

Cyber War

Pentagon has formally recognized cyberspace as a new domain in warfare critical to military operations as land, sea, air, and space. China has plans of winning informationised wars by the mid-21st century

Cyber War

countries are likewise organizing for cyber war, among them are Russia, Israel and North Korea Iran claims of having the worlds secondlargest cyber-army. U.S. has a severe shortage of computer security specialists

Countries at the top

only about 1,000 qualified people in the country but needs a force of 20,000 to 30,000 skilled experts Pakistan ????

CYBER FORENSICS CAN BE AN EFFECTIVE TOOL

CYBER FORENSICS & TECHNOLOGY

The unique process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally accepted.

CYBER FORENSICS

IS

TECHNICAL OPERATIONAL SOCIAL LEGAL

MULTI DIMENSIONAL CHALLENGE

TECHNOLOGY IS CHANGING RAPIDLY CYBER CRIMES ARE ALSO CHANGING RAPIDLY SYSTEMS AND CRIMES EVOLVE MORE RAPIDLY THAN THE TOOLS THAT EXAMINE THEM

TECHNICAL

NEW METHODOLOGIES

NEW TOOLS

TECHNOLOGY EVOLUTION NEWER DEVICES

OBSOLESENCE

ALL DATA MUST BE GATHERED AND EXAMINED FOR EVIDENCE

GIGABYTES OF DATA PROBLEMS OF


STORAGE ANALYSIS PRESENTATION..

NO STANDARD SOLUTION AS YET

OPERATIONAL

IT RESULTS IN UNCERTAINITIES ABOUT EFFECTIVENESS OF CURRENT INVESTIGATION TECHNIQUES SUB OPTIMAL USE OF RESOURCES PRIVACY CONCERNS

SOCIAL

USE & BOUNDS OF DIGITAL EVIDENCE IN LEGAL PROCEDURES STILL UNCLEAR CURRENT TOOLS & TECHNIQUES NOT RIGOROUSLY USED / CONTESTED IN COURT

LEGAL

EMAIL TRACER TRUEBACK CYBERCHECK MANUAL

TYPICAL TOOLS

Use anti-virus software and firewalls - keep them up to firewalls - keep them up to date Keep your operating system up to date with critical security updates and patches Don't open emails or attachments from unknown source Don't share access to your computers with strangers If you have a Wi-Fi network, password protect it Disconnect from the Internet when not in use

PROTECT YOUR COMPUTERS!

"The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb".
National Research Council

Click to edit Master text styles Second level Third level Fourth level Fifth level

Questions??

S-ar putea să vă placă și