02-07-2012, 10:51 AM
Cyber Crimes
Cyber Crimes.ppt (Size: 54.5 KB / Downloads: 51)
What’s Cyber Crimes?
Cyber crime, also called computer crime, is any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed .
Types of Attacks
Military and Intelligence Attacks
Business Attacks
Financial Attacks
Terrorist Attacks
Grudge Attacks
“Fun” Attacks
Types of Offenders
Cracker: motivation is to access a system or data
Criminals: motivation is financial gain.
Vandals: motivation is to damage the system or data files.
Steps taken after the breach
The first step is to assess the situation.
- What is the severity level of the intrusion?
- Who will be involved in the investigation?
- Who is responsible for determining future actions?
The second step is to repair damage and prevent recurrence.
Under a serious breach, asking
- Government agencies.
- Private companies.
Report Cyber Crimes
Cyber crimes the NCCS (The FBI’s National Computer Crimes Squad) investigates include:
- Intrusions of the Public Switched Network (the telephone company).
- Major computer network intrusions.
- Network integrity violations.
- Privacy violations
- Industrial espionage.
- Pirated computer software.
- Other crimes where the computer is a major factor in committing the criminal offense.
Methods of investigations
The important first step is determining if a criminal still has control of any relevant computer.
As a general rule, an investigator should not let the attacker know that they are being disconnected or tracked due to unauthorized access.
Cyber Crimes.ppt (Size: 54.5 KB / Downloads: 51)
What’s Cyber Crimes?
Cyber crime, also called computer crime, is any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed .
Types of Attacks
Military and Intelligence Attacks
Business Attacks
Financial Attacks
Terrorist Attacks
Grudge Attacks
“Fun” Attacks
Types of Offenders
Cracker: motivation is to access a system or data
Criminals: motivation is financial gain.
Vandals: motivation is to damage the system or data files.
Steps taken after the breach
The first step is to assess the situation.
- What is the severity level of the intrusion?
- Who will be involved in the investigation?
- Who is responsible for determining future actions?
The second step is to repair damage and prevent recurrence.
Under a serious breach, asking
- Government agencies.
- Private companies.
Report Cyber Crimes
Cyber crimes the NCCS (The FBI’s National Computer Crimes Squad) investigates include:
- Intrusions of the Public Switched Network (the telephone company).
- Major computer network intrusions.
- Network integrity violations.
- Privacy violations
- Industrial espionage.
- Pirated computer software.
- Other crimes where the computer is a major factor in committing the criminal offense.
Methods of investigations
The important first step is determining if a criminal still has control of any relevant computer.
As a general rule, an investigator should not let the attacker know that they are being disconnected or tracked due to unauthorized access.