13-02-2013, 10:05 AM
COMPUTER CRIMES -THE LAW ENFORCMENT PERSPECTIVE
COMPUTER CRIMES.ppt (Size: 614 KB / Downloads: 87)
INTRODUCTION
Computer Crime Branch &
Computer Forensic Branch
IT Crime Investigation Procedures
Computer Crime Prevention &
Incident Management
Conclusion
CASE STUDY ONE
The Perfect Computer Crime System Analyst used Trojan horse program to capture colleagues password and used it to modify the Lucky Draw Program. Also gained root access whilst auditing computer system and replaced Lucky Program with fake program that allowed 3 friends to ‘win’ $485,000
CASE STUDY TWO
Crashing of Factory Computer System Disgruntled system administrator inserted logic bomb that replaced system files with damaged files during backup process. Also used another logic bomb to time backing up process while he was on holiday. Caused entire company’s system to crash and halted production lines. After his dismissal, he asked a computer illiterate colleague to crash system files.
CASE STUDY THREE
Smart Card Scam - Managers of Cinema Chain modified Daily Cashiers’ Reports on computer system and siphoned off cash. Also topped up used Smart cards illegally and sold them to cinema touts. Enlisted help of a computer service engineer to load program into a branch so as to further the crime.
CONCLUSION
Report the incident as early as possible
Record all irregularities
Do not allow anyone to meddle with the computer
Do not restore the affected system