Introduction to the Module,
Cyber Crime, and Cyber
Security
Lecture 1
Presenter: Dr. Jianming Cai
[email protected] CC7177 Cyber Crime and Cyber Security
Module Syllabus
• Introduction to the module and cyber security
• Background to the development, evolution and challenges
of, and legislative context for digital and cybercrimes
• Various types of current and emerging online cyber-
attacks, threats and criminal acts, including related digital
crimes.
• Technical measures, controls and applications in areas of
applied cryptography, steganography, network intrusion,
authentication, authorisation, including new technological
developments.
• The economic, legal, social, ethical and professional
impact of cybercrime and cyber security within the national
and global context.
CC7177 Cyber Crime and Cyber Security
Module Weekly Teaching Plan
Week Topic Ref.
Introduction to the module, cyber crime, and cyber Chp. 1 - Thomas
1
security J. Holt, etl.
Challenges of cyber crime and legislative context for Chp. 1&2 -
2
digital and cybercrimes Robin, B.
Chp. 2 - Thomas
3 Computer hackers and hacking
J. Holt, etl.
Chp. 4 - Chuck
4 Denial of service attacks
Eastton
Chp. 3 - Thomas
5 Malware and automated computer attacks
J. Holt, etl.
Chp. 6 - Chuck
6 Techniques used by hackers
Eastton
Chp. 9 - Chuck
7 Security technology
Eastton
Chp. 11 - Chuck
8 Network scanning and vulnerability scanning
Eastton
Chp. 13 - Chuck
9 Cyber detective
Eastton
Chp. 10 -
10 Digital forensics Thomas J. Holt,
etl.
11 Revision
CC7177 Cyber Crime and Cyber Security
Key Reference Books
1. Computer Security Fundamental, 3/E, Chuck
Eastton, ISBN-13: 978-0-7897-5746-3, © 2016,
Pearson
2. Cybercrime and Digital Forensics, An Introduction,
Thomas J. Holt, Adam M. Bossler, and Kathryn C.
Seigfried-Spellar, ISBN: 978-1-138-02129-7
(hbk)/ISBN: 978-1-138-02130-3 (pbk)/ISBN: 978-1-
315-77787-0 (ebk), 2015, Routledge
3. Robin, B., (2008) Investigating Digital Crime. Wiley
CC7177 Cyber Crime and Cyber Security
The Digital Divide
• Computers and mobile devices are now
ubiquitous.
– The availability of Computer-Mediated
Communications (CMC), like e-mail, text, Facebook,
etc. has changed the world.
• This is a recent innovation, causing a
generational divide.
– Digital Natives.
– Digital Immigrants.
CC7177 Cyber Crime and Cyber Security
Technology as a
Landscape for Crime
• There are three key ways that technology may
be subverted or misused by criminals:
– technology as a communications medium
– computer as a target of or means to engage in crime
– technology as an incidental device to a crime.
CC7177 Cyber Crime and Cyber Security
Technology as Communications
Medium
• CMCs make it easy for offenders to connect with
one another.
– Prostitutes and customers connect via e-mail or text.
– Hackers connect via forums.
• The ability to connect in on-line environments
has enabled the formation of virtual subcultures.
– Subcultures are groups which have their own values,
norms, and traditions that set them apart from and/or
in opposition to the dominant culture.
CC7177 Cyber Crime and Cyber Security
Technology as a Target
• The computers and mobile devices we use
every day can be targeted by offenders to cause
harm to information or people.
– Computer hackers attempt to gain access to systems
they do not own.
• Password guessing.
• Web defacement.
– Malicious software can harm computers and personal
information.
CC7177 Cyber Crime and Cyber Security
Technology as Evidence
• The devices we use produce digital evidence of
our activities:
– information that is either stored or transferred in
binary form
– photos, chat logs, e-mails, browser histories, etc.
• Digital evidence can be used to support
criminal investigations of virtually any offense,
on- or off-line.
CC7177 Cyber Crime and Cyber Security
Defining Computer Misuse
• There are several key terms to define abuse
and misuse of technology.
– Cyberdeviance is behaviors that may not be illegal
but go against local norms or values.
– Cybercrimes occur when a perpetrator uses special
knowledge of cyberspace to commit a crime.
– Cyberterror involves the use of digital technology or
CMCs to cause harm and force social change based
on ideological or political beliefs.
CC7177 Cyber Crime and Cyber Security
Why Is Cybercrime Attractive?
• There are several reasons why individuals may choose to
engage in cybercrimes relative to real world offenses.
– Individuals can easily gain access to technology and Internet
access in virtually any corner of the globe.
– Cybercrimes can be performed regardless of any technical
skill.
– Offenders can target millions of victims at once.
– The risk of detection is greatly reduced.
– Law enforcement agencies have trouble prosecuting these
crimes, especially in transnational cases.
– Many victims may not report their experiences.
CC7177 Cyber Crime and Cyber Security
Law Enforcement and
Cybercrime
• Since cybercrime is so attractive to offenders, law
enforcement has difficulty investigating these
offenses.
– There are multiple levels of law enforcement
which handle cases based on their jurisdictional
responsibilities.
• Local law enforcement.
• State/Provincial police.
• Federal/National Police Forces.
CC7177 Cyber Crime and Cyber Security
Wall’s Typology of
Cybercrime
• Cyber-Trespass
– Individuals cross boundaries of computer systems
into areas where ownership has already been
established.
• Hackers, crackers, phreakers.
• Cyber-Deception/Theft
– Criminal acquisitions that can occur on-line.
• Pirates, fraudsters, and hackers.
CC7177 Cyber Crime and Cyber Security
Wall’s Typology of
Cybercrime
• Cyber-Porn/Obscenity
– Pedophiles, cam whores, pornographers.
• Not always criminal.
• Sexual services.
• Cyber-Violence
– Violence against individuals or groups on-line.
• Cyberstalking.
• Cyberhate.
• Tech-talk.
CC7177 Cyber Crime and Cyber Security