29-05-2012, 03:04 PM
CYBER CRIME IN U.S.A
CYBER CRIME IN U.pptx (Size: 136.24 KB / Downloads: 30)
“Criminal acts using computers and networks as tools or targets”
“Traditional crimes conducted through the use of computers”
Introduction
Cybercrime
Social Networking:
The New Media and
Means for Discourse
The Contexts of Cybercrime
1. Cybercrimes against individuals
2. Cybercrimes against groups
3. Cybercrimes against property
4. Cybercrimes against corporations
5. Cybercrimes against governments
A Cyber Crime Taxonomy: Sorting Through a Big Pile of Badness
When it comes to looking at a topic as broad as cyber crime, it's helpful to have some structure. For me, the organization that makes the most sense is:
1. "Classic" Cybercrimes: Focus Is On the Hardware/Network Itself 2. Internet Fraud: Crimes of Deception 3. Content/Substance-Oriented Online Crimes
That list should catch most of the major cyber crimes that folks are worried about, EXCEPT for cyber war, cyber terrorism, and cyber espionage (all of which I'm defining as being out of scope for this talk except as those areas may incidentally come up in connection with other cyber crimes).
Colored Boxes” and Other Phone Tech
Blue box: emitted a 2600Hz in-band signal that the call had ended, after which additional in-band signals could be sent to make calls which wouldn’t be charged
Red box: faked the sound of coins being deposited in a payphone
Green box: generated coin collect, coin return and ringback tones for payphones
Black box: prevents call-has-been-answered detection
Silver box: this device generates “flash,” “flash override priority,” “priority communication” and “priority override (top military)” signaling tones, although those tones were not officially used.
War dialers: these would systematically call all lines in a given telephone prefix, typically looking for lines with dial in modems