0% found this document useful (0 votes)
94 views16 pages

Understanding Cyber Crimes and Security

This document discusses cyber crimes and security. It defines cyber crime as illegal behavior using electronic means to target computer systems and data. It outlines different types of cyber attacks including those by military, businesses, terrorists, and individuals. The document also categorizes types of offenders and discusses various breaches involving physical security, personnel security, communications security, and operations security. It provides examples of specific cyber crimes and steps that can be taken to prevent and investigate cyber crimes.

Uploaded by

Vinay Chauhan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views16 pages

Understanding Cyber Crimes and Security

This document discusses cyber crimes and security. It defines cyber crime as illegal behavior using electronic means to target computer systems and data. It outlines different types of cyber attacks including those by military, businesses, terrorists, and individuals. The document also categorizes types of offenders and discusses various breaches involving physical security, personnel security, communications security, and operations security. It provides examples of specific cyber crimes and steps that can be taken to prevent and investigate cyber crimes.

Uploaded by

Vinay Chauhan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd

Cyber Crimes

Chunlian QU

4/12/2012

Whats Cyber Crimes?

Cyber crime, also called computer crime, is any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed .

4/12/2012

Types of Attacks

Military and Intelligence Attacks Business Attacks Financial Attacks Terrorist Attacks Grudge Attacks Fun Attacks

4/12/2012

Types of Offenders

Cracker: motivation is to access a system or data Criminals: motivation is financial gain. Vandals: motivation is to damage the system or data files.

4/12/2012

Types of Security

Physical security Personnel security Communications security Operations security

4/12/2012

Types of Cyber Crimes


- Breaches of physical security

Dumpster diving (trashing) Wiretapping Eavesdropping on Emanations Denial or Degradation of Service


Prevention method: - Locks and keys. - Natural disasters - Environmental threats
6

4/12/2012

Types of Cyber Crimes


- Breaches of Personnel security

Masquerading Social engineering Harassment Software piracy


Prevention method: - Background checks and careful monitoring on the job
7

4/12/2012

Types of Cyber Crimes


- Breaches of communications and data security
(Data attacks)

Unauthorized Copying of Data Traffic analysis Covert channels

4/12/2012

Types of Cyber Crimes


- Breaches of communications and data security
(Software attacks)

Trap doors (back doors) Session hijacking Tunneling Timing Attacks Trojan horses Viruses and Worms

4/12/2012

Types of Cyber Crimes


- Breaches of communications and data security
(Software attacks)

Salamis Logic bombs Prevention methods: - Access control - Cryptographic methods - Physical protection and shielding of network cabling - Firewall technology
10

4/12/2012

Types of Cyber Crimes


- Breaches of operations security

Data diddling (false data entry) IP spoofing Password Sniffing Scanning Excess Privileges
Prevention: The only way it can be effective is if it is integrated into an organizations physical, personnel, and communications security programs.
11

4/12/2012

Steps taken after the breach

The first step is to assess the situation. - What is the severity level of the intrusion? - Who will be involved in the investigation? - Who is responsible for determining future actions?
12

4/12/2012

Steps taken after the breach

The second step is to repair damage and prevent recurrence. Under a serious breach, asking - Government agencies. - Private companies.

4/12/2012

13

Report Cyber Crimes

4/12/2012

Cyber crimes the NCCS (The FBIs National Computer Crimes Squad) investigates include: - Intrusions of the Public Switched Network (the telephone company). - Major computer network intrusions. - Network integrity violations. - Privacy violations - Industrial espionage. - Pirated computer software. - Other crimes where the computer is a major factor in committing the criminal 14 offense.

Methods of investigations

The important first step is determining if a criminal still has control of any relevant computer. As a general rule, an investigator should not let the attacker know that they are being disconnected or tracked due to unauthorized access.

4/12/2012

15

Suggestions because of laws

Firms should secure their networked information. Government should assure that their laws apply to cyber crimes. Firms, governments, and civil society should work cooperatively to strengthen legal frameworks for cyber security.

4/12/2012

16

You might also like