20-06-2012, 06:04 PM
COMPUTER CRIMES -THE LAW ENFORCMENT PERSPECTIVE
COMPUTER CRIMES .ppt (Size: 497 KB / Downloads: 58)
INTRODUCTION
Computer Crime Branch &
Computer Forensic Branch
IT Crime Investigation Procedures
Computer Crime Prevention &
Incident Management
Conclusion
CASE STUDY ONE
The Perfect Computer Crime System Analyst used Trojan horse program to capture colleagues password and used it to modify the Lucky Draw Program. Also gained root access whilst auditing computer system and replaced Lucky Program with fake program that allowed 3 friends to ‘win’ $485,000
CASE STUDY TWO
Crashing of Factory Computer System Disgruntled system administrator inserted logic bomb that replaced system files with damaged files during backup process. Also used another logic bomb to time backing up process while he was on holiday. Caused entire company’s system to crash and halted production lines. After his dismissal, he asked a computer illiterate colleague to crash system files.
CASE STUDY THREE
Smart Card Scam - Managers of Cinema Chain modified Daily Cashiers’ Reports on computer system and siphoned off cash. Also topped up used Smart cards illegally and sold them to cinema touts. Enlisted help of a computer service engineer to load program into a branch so as to further the crime.
CASE STUDY FOUR
Distribution of user-ids and passwords - Two youths stole user-ids and passwords of unsuspecting users of an ISP during IRC sessions and displayed the user-ids and passwords on a web site stating that the ISP’s system security had been breached.