Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Cyber Crimes

No description
by

Yesenia Barraza

on 21 November 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cyber Crimes

photo credit Nasa / Goddard Space Flight Center / Reto Stöckli
Cybercrimes
Background & History
How does it happen?
-Whether it is
personal
or
business
information, both types of information are valuable to criminals.

-A cyber criminal will attempt to steal information from bank accounts, credit cards or social security numbers and use it for
identity theft, credit card fraud or even fraudulent withdrawals from bank accounts.
Where does it happen?
Who is victimized?
Adults (
biggest target
):
65% of Web Users Are Victims of Cybercrime
Computers
Ex.: Network threats, Viruses, Internet Scams, Identity theft, etc.
Example Case A
The
United States
charged
eight individuals
that were
using data from credit cards that were hacked
. These incidents occurred on December 2012 and February 2013. The total amount that was stolen from people's
bank accounts
was
$45 million
.
What is Cybercrime?
Cybercrime
: refers to
any crime
that involves a
computer
and a
network
, where the computers may or may not have played an instrumental part in the
commission of a crime.
Example Case B
In July of 2013, five cybercrime hackers were responsible for companies
losing over $300 million
. Five men from
Russia
and
Ukraine
had stolen over
160 credit card numbers
. They each had specific jobs when they were getting the numbers: two
hacked
into
networks
, another
went through the networks to find data
, another provided
anonymous web-hosting services
to
hide the group’s activities
, and another
sold the stolen data
and
distributed the profits
.
Statistics
According to a recent study from a security software , manufacturing company, cybercrime has is
costing the world $110 billion a year
. According to another study the annual cost worldwide is approximately
$1 trillion
. The majority of
cybercrimes
are
not reported
because companies fear that it will give them a bad name, the company did not lose a ton of money, or the company did not even notice the loss at all.
Importance
Why should we consider cybercrimes important?
Laws
UNITED STATES CODE
TITLE 18. CRIMES AND CRIMINAL PROCEDURE
PART I -CRIMES
CHAPTER 47-FRAUD AND FALSE STATEMENTS
Section 1030. Fraud and related activity in connection with computers.
Having knowingly accessed a computer without authorization, obtain information from a financial record or bank card, information obtained from any department or agency of the US, physical injury to any person, and threat to public health or safety.
Defense against this Crime besides laws?
Organizations:
United Nations
Council of Europe
International Telecommunication Union

Computer Software:
Norton
McAfee
How to Protect Your Computer?


"reduce your vulnerability"

1. Keep your firewall turned on.

2. Install or Update Your Antivirus Software.

3. Install or Update Your Antispyware Technology.

4. Keep Your Operating System Up to Date.

5.Be Careful What You Download.

6.Turn Off Your Computer, properly.
Conclusion
In conclusion, the entire network can be used for all sorts of cyber crimes, and one should try to avoid these problems by protecting one's computer, tablet, phone, etc. from suspicious websites or downloading suspicious data/apps. As adults/parents/young adults, we should prohibit children to avoid using any social media app and we should enforce parental locks on every device the child uses to avoid cyber bullying or any internet predators. However, if anyone encounters any type of cybercrime, the best decision to make is to report it as soon as possible to the FBI, etc.

QUESTIONS?
Resources
http://www.fbi.gov/scams-safety/computer_protect
http://msisac.cisecurity.org/newsletters/2011-07.cfm
http://www.carnegiecyberacademy.com/facultyPages/cyberCriminals/operate.html
Types of Cybercrimes?
Fraud
Phishing
Distribution of Viruses: computer, tablet, cellphone
Stalking or Harassment
Piracy
Spam
Hacking
Sabotage
Cyber Bullying
Cyber Stalking

Viruses, Trojans and Worms
A
worm
is a type of
harmful program
that makes
several copies of itself
. It can copy itself
from using an email
or a
similar mode of transport
, or copy itself from
one disk drive
to a
different one
. Worms can
compromise the security
and
significantly damage a computer
.
http://cybercrime.planetindia.net/intro.htm
http://www.brighthub.com/internet/security-privacy/articles/83740.aspx
http://msisac.cisecurity.org/newsletters/2011-07.cfm
A
virus
is a type of
code or harmful program
that
replicates and/or infects another partition sector
,
program
,
document
, or
boot sector
that supports macros through
attaching itself
or
inserting itself
to that medium. Many viruses can cause
significant damage to a computer
.
A Trojan Horse
is a type of
harmful program
that neither copies itself or replicates itself, but
compromises the security
or
causes damage
to a computer. In most cases, a Trojan Horse is
sent via email
, and when opened or downloaded, it
infects the computer
.
http://www.security-faqs.com/cyber-security-why-is-so-important.html
http://cybercrime.planetindia.net/intro.htm
http://www.brighthub.com/internet/security-privacy/articles/83740.aspx
http://www.security-faqs.com/cyber-security-why-is-so-important.html
Where is cyber crime most common?
What are the most common types of cyber crime?
http://www.computerhistory.org/tdih/July/7/
•Unpatched or outdated
network software
.

•Obvious, old, or weak
passwords
.


Security
that is poorly defined or not well-defined.

•Running
unnecessary software or programs
or not secured, such as FTP.

•Having
firewalls
with
several holes
.

•Having
information leaked
through finger, telnet, gopher, and other similar services.


Software
being
installed on a network
without
approval
of the
Information Systems department.
http://www.brighthub.com/internet/security-privacy/articles/83740.aspx
Bank ATM's

Computers
(Household, Business, Public)

Cellphones

Tablets

Specifically through computer networks.
http://www.enigmasoftware.com/top-20-countries-the-most-cybercrime/
http://www.wired.com/threatlevel/2009/02/stolen-wallets/
http://www.insidecounsel.com/2013/07/26/five-hackers-charged-in-biggest-cyber-crime-case-i
The first recorded cyber crime took place in France.In the year 1820,
Joseph-Marie Jacquard
, a textile manufacturer, produced the
loom
. This device allowed to repeat a series in
steps to weave special fabrics
. This resulted in fear among Jacquard's employees that they would no longer be needed and would be replaced with this device. They committed acts of sabotage to discourage Jacquard from using this new technology. This is the first recorded cyber crime!

http://m.neatorama.com/2008/01/25/the-wonderful-world-of-early-computing/#!nC9RM
http://cacm.acm.org/magazines/2013/3/161196-cybercrime-its-serious-but-exactly-how-serious/fulltext
A hacker could be
anyone
.

Cyber criminals follow a number of techniques in order to acquire
e-mails, Ids, credit card numbers, bank account numbers and passwords
which are then
misused
by them.

Viruses can not only
slow your system down
, they can make it
crash
too.

Not only can
household computers
be infected, even
big businesses
can be affected too.
Cyber criminals can access information from
http://cacm.acm.org/magazines/2013/3/161196-cybercrime-its-serious-but-exactly-how-serious/fulltext
http://www.ehow.com/how_8578627_stop-cyber-victimization-home.html

http://www.oas.org/juridico/spanish/us_cyb_laws.pdf
http://www.cybercrimelaw.net/US.html
Substantive cyber crime laws:
Laws
prohibiting

online theft, hacking, intrusion into computer systems, child pornography, intellectual property, online gambling.
Procedural cyber crime laws:
Authority to obtain
electronic data from third parties, including internet service providers; authority to intercept electronic communications.
Consequences of breaking the law:
Jail time
(depending on the severity of crime)
Fined
(also depending on how severe the crime is)
Briana Limeta, Kristen Mccann, Yesenia Barraza, Stephannie Jimenez
Social Network = Virus!
http://www.ndtv.com/article/world/us-indicts-hackers-in-biggest-cyber-fraud-case-397203
The story was published on August 17, 2013: Instagram, Twitter, Youtube, LinkedIn, etc. are popular websites that cyber criminals are using to get a hold of credit card information, and identity theft.
Recent Cyber Crimes!
Zeus, a computer virus, exposed through fake social media accounts such as online marketing.
Zeus controls infected computers, Forces specific users to post fake likes, and engage in other operations or download other types of malicious software.
http://www.insidecounsel.com/2013/07/26/five-hackers-charged-in-biggest-cyber-crime-case-i
http://www.ndtv.com/article/world/us-indicts-hackers-in-biggest-cyber-fraud-case-397203
http://www.wired.com/threatlevel/2009/02/stolen-wallets/
http://www.enigmasoftware.com/top-20-countries-the-most-cybercrime/
http://cacm.acm.org/magazines/2013/3/161196-cybercrime-its-serious-but-exactly-how-serious/fulltext
http://www.oas.org/juridico/spanish/us_cyb_laws.pdf
http://www.cybercrimelaw.net/US.html
http://www.voanews.com/content/us-cyber-crime-eight-scheme/1657912.html
Full transcript