Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Damage done by cyber-attacks

• Viruses: are self-replicating programs that can attach itself to another program or file in order to reproduce. The virus can hide in unlikely locations in the memory of a computer system and attach itself to whatever file it sees fit to execute its code. It can also change its digital footprint each time it reproduces making it even harder to track down in the computer.

• Worms: replicate over a network using protocols. The latest incarnation of worms make use of known vulnerabilities in systems to penetrate, execute their code, and replicate to other systems

• Trojan horse: is designed to perform legitimate tasks but it also performs unknown and unwanted activity

Impersonation

This is someone who assumes another persons identity. One ethical issue of this is that people use it many times for fraud so that they can receive certain information like bank accounts, locations, combinations, passwords between several others.

Child Pornography

Child pornography is divided into simulated child pornography and pornography, which was produced with direct involvement of the child (also known as child abuse images). Abuse of the child occurs during the sexual acts, which are recorded in the production of child pornography. This has an enormous ethical issue which would be that this isn’t right because by doing this the person doing it is doing not going against one but if not several laws.

Virus Deployment

The way viruses are inserted into a computer is very interesting it might be done by a simple e-mail or link but there is also the Trojan horse or hacking a system and in both the people could insert the virus into a computer without the owner even knowing.

Types of Frauds

  • bank fraud
  • identity theft
  • extortion
  • theft of classified information

Some cybercriminals

Some of the criminal groups none are MOD (masters of depection), they are a group of hackers, pan-European Hacking group, Newscorp, Mafiaboy, between several other.

Cyberattacks using e-mail

The receptor in this situation can be receiving by e-mail any that may harm him or she, once the e-mail is opened it can release a virus, it can let a hacker into a computer or even let a hacker control the computer.

Cyber-attacks against Online Banking

  • Bank of America – JP Morgan Chase
  • U.S. Bank & PNC reported problems with customer websites after financial services security group warned about a possible cyber – attack
  • Wells Fargo may have also been a victim of DDoS (a campaign of Distributed Denial-of-Service) attacks

Budapest Convention on Cybercrime

  • Opened for signature: November 2001 in Budapest
  • Provides for:
  • "Consistent and harmonised substantive criminal law"
  • "Procedural law tools for law enforcement"
  • "Efficient international cooperation"

Argentina: Law # 26.388 on Informative Crime

http://www.infoleg.gov.ar/infolegInternet/anexos/140000-144999/141790/norma.htm

Awareness Campaigns against Cybercrime

  • International Cyber Security Protection Alliance: https://www.icspa.org/
  • Global not-for-profit organization
  • Established to
  • Channel funding
  • Expertise
  • Assistance directly to assist law enforcement cyber crime units in both domestic and international markets

  • Delhi Police: http://articles.timesofindia.indiatimes.com/2013-02-20/internet/37199132_1_cyber-crime-cyber-laws-internet-safety
  • Launched an awareness and safety campaign
  • Aimed at curbing rampant increase in cyber crimes
  • National Cyber Security Awareness Month 2012: http://www.dhs.gov/defending-against-cybercriminals
  • Multi-State Information Sharing and Analysis Center (MS-ISAC)
  • National Association of State Chief Information Officers (NASCIO)

Cybercrime and Interpol Collaboration

  • Interpol’s cybercrime programme
  • Built around training and operations
  • Works to keep up with emerging threats
  • Aims to:
  • Promote the exchange of information among member countries through  regional working parties and conferences
  • Deliver  training courses to build and maintain professional standards
  • Coordinate and assist international operations
  • Establish a global list of contact officers available around the clock for cybercrime investigations
  • Assist member countries in the event of cyber-attacks or cybercrime investigations through investigative and database services
  • Develop strategic partnerships with other international organizations and private sector bodies
  • Identify emerging threats and share this intelligence with member countries
  • Provide a secure web portal for accessing operational information and documents.

Types of legal actions against any cyber criminals

  • Over 50 national governments have:
  • Pieces of legislation
  • Copies of updated statutes
  • Draft legislation
  • Categories
  • Data-related crimes - interception, modification, theft
  • Network-related crimes - interference, sabotage
  • Crimes of access - hacking, virus distribution
  • Associated computer-related crimes - aiding, abetting cyber criminals, computer fraud, computer forgery

Terms

  • Phishing (n): the activity of defrauding an online account holder of financial information by posing as a legitimate company
  • Malware (n): software that is intended to damage or disable computers and computer systems
  • Worm (n): a self replicating program able to propagate itself across a network, typically having a detrimental effect
  • Trojan Horse (n): designed to perform legitimate tasks and to perform unknown and unwanted activities
  • Spam (n): the unsolicited sending of bulk e-mail for commercial purposes
  • Spyware (n): software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive

Cybercrime

http://www.nbcnews.com/technology/technolog/3-more-major-us-banks-report-possible-cyber-attacks-6126050

Cybercrime article

  • Cybercrime Network Based in Spain Is Broken Up
  • http://www.nytimes.com/2013/02/14/business/global/europol-takes-down-cybercrime-gang-in-spain.html?_r=2&

Types of Cybercrimes

• Spam: the unsolicited sending of bulk email for commercial purposes

• Fraud: Any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss

• Obscene or offensive content: content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons

• Harassment: harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation

• Threats: spoken or written "true threat" speech/text is criminalized because of "intent to harm or intimidate", that also applies for online or any type of network related threats in written text or speech

• Drug Trafficking: Drug traffickers are increasingly using the Internet to sell their illegal substances through encrypted e-mail and other Internet Technology

• Cyber terrorism: someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attack against computers, network, and the information stored on them

• Cyber warfare: refers to politically motivated hacking to conduct sabotage and espionage

Emilia Vindas

Cybercrimes

Daniela Fernandez

Cybercrimes

Cybercrimes are crimes committed using a computer and the Internet to steal a person’s identity, sell contraband, stalk victims, or disrupt operations with malevolent programs.

The concept cybercrime began in the late 90’s, that is when cybercrime was officially recognized, however, in 1972 John Draper, better known as Captain Crunch, discovered he could fool the AT&T network, committing the first cybercrime.

Learn more about creating dynamic, engaging presentations with Prezi