Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Cyber Crimes

Stephanie McGovern & Michael Leonard

What are Cyber Crimes?

What are cybercrimes?

Types of Cyber Crimes

Types of Cyber Crimes

  • Common types of cybercrime include hacking, online scams and fraud, identity theft, attacks on computer systems and illegal or prohibited online content.
  • The effect of cybercrime can be extremely upsetting for victims, and not necessarily just for financial reasons.

Informational Graphs

History

Timeline

1970

1970

Hacking became evident in the 1970's when early computerized phone systems became a target.

Technologically savvy individuals, called “phreakers” discovered the correct codes and tones that would result in free long distance service. They impersonated operators, dug through Bell Telephone company garbage to find secret information, and performed countless experiments on early telephone hardware in order to learn how to exploit the system.

1986

1986

The systems administrator at the Lawrence Berkeley National Laboratory, Clifford Stoll, discovered that there were irregularities in the data and he determined that an unauthorized user was hacking into his computer network.

Stoll used what is called a “honey pot tactic,” which lures a hacker back into a network until enough data can be collected to track the source. Stoll’s effort paid off with the eventual arrest of Markus Hess and a number of others located in West Germany, who were stealing and selling military information, passwords and other data to the KGB.

1990

1990

During a project dubbed Operation Sundevil, FBI agents confiscated 42 computers and over 20,000 floppy disks that were allegedly being used by criminals for illegal credit card use and telephone services. This two-year effort involved 150 agents.

Today

Crime and cyber crime will continue to be present in our society, regardless of the best efforts of the criminal justice system. The public and private sector need highly skilled individuals to combat this threat and help prevent the prosecution of innocent people.

Cyber Crime Cases

Cyber Crime Case

From 2013-2016 Yahoo was dealing with a breach in their system that was said to have been caused by a group of professional hackers located somehwere in Eastern Europe.

Some of the informaiton stolen included

Yahoo login (ID):

Country code:

Recovery email (linked with the profile):

Date of birth:

Hash of Password (MD5):

Cellphone number:

ZIP code, if it was provided by the user for password recovery

and much more

At the time, Yahoo had urged all its users to change its passwords, though had specifically notified the 1 billion user accounts it thought were compromised.

Yahoo Breach

Computer and Network Intrusions

  • The collective impact is alarming. Billions of dollars are lost every year repairing systems hit by such attacks.
  • Some take down vital systems, disrupting and sometimes disabling the work of hospitals, banks, and 9-1-1 services around the country.

Computer and Network Intrusions

Who is behind such attacks?

-Computer geeks looking for bragging rights

-Businesses trying to gain an upper hand in the marketplace by hacking competitor websites

-Rings of criminals wanting to steal your personal information and sell it on black markets

-Spies and terrorists looking to rob our nation of vital information or launch cyber strikes

a type of malicious software designed to block access to a computer system until a sum of money is paid.

Ransomeware

Hospitals, school districts, state and local governments, law enforcement agencies, small businesses, large businesses—these are just some of the entities impacted by ransomware, an insidious type of malware that encrypts, or locks, valuable digital files and demands a ransom to release them.

  • In a ransomware attacks, victi...
  • In a ransomware attacks, victims upon seeing an e-mail addressed to them will open it and may click on an attachment that appears legitimate, like an invoice or an electronic fax, but which actually contains the malicious ransomware code.
  • Or the e-mail might contain a legitimate-looking URL, but when a victim clicks on it, they are directed to a website that infects their computer with malicious software.

How to protect against cyber crimes

1. Use a full-service Internet security suite to ensure that you are protecting yourself against viruses, as well as other emerging threats on the Internet.

2. Use strong passwords, don’t repeat your passwords

3. Keep all your software updated.

4. Manage your social media settings to keep most of your personal and private information locked down.

5. Secure your home network with a strong encryption password as well as a VPN.

6. Keep up to date on major security breaches.

7. If you believe that you’ve become a victim of a cybercrime, you need to alert the local police

Learn the warning signs of fraudulent behavior a...

Learn the warning signs of fraudulent behavior and wire fraud. Be extremely careful when giving out sensitive personal information such as social security numbers and bank account access codes over the Internet.

Otherwise, take basic precautions for keeping your data private. Use passwords that are difficult to hack and change them frequently.

Bibliography

Bibliography

http://searchsecurity.techtarget.com/definition/cybercrime

https://www.floridatechonline.com/blog/information-technology/a-brief-history-of-cyber-crime/

http://money.cnn.com/2015/10/08/technology/cybercrime-cost-business/index.html

http://content.time.com/time/nation/article/0,8599,1902073,00.html

http://criminal.findlaw.com/criminal-charges/computer-crime.html

https://www.interpol.int/Crime-areas/Cybercrime/Cybercrime

https://us.norton.com/internetsecurity-how-to-how-to-recognize-and-protect-yourself-from-cybercrime.html

https://www.britannica.com/topic/cybercrime

Learn more about creating dynamic, engaging presentations with Prezi