SlideShare una empresa de Scribd logo
1 de 40
CYBER CRIMECYBER CRIME
IN THE DIGITAL AGEIN THE DIGITAL AGE  
STRATEGIES & SOLLUTIONSSTRATEGIES & SOLLUTIONS
CYBER CRIME: THE INTRODUCTION 
In a digital age, where online communication has become the
norm, internet users and governments face increased risks of
becoming the targets of cyber attacks. As cyber criminals
continue to develop and advance their techniques, they are
also shifting their targets — focusing less on theft of financial
information and more on business espionage and accessing
government information. To fight fast-spreading cyber crime,
governments must collaborate globally to develop an effective
model that will control the threat.
TYPES OF CYBERCRIME
HACKING:
This is a type of crime wherein a person’s computer is
broken into so that his personal or sensitive
information can be accessed. In the United States,
hacking is classified as a felony and punishable as
such. This is different from ethical hacking, which
many organizations use to check their Internet security
protection. In hacking, the criminal uses a variety of
software to enter a person’s computer and the person
may not be aware that his computer is being accessed
from a remote location.
THEFT:
This crime occurs when a person violates copyrights
and downloads music, movies, games and software.
There are even peer sharing websites which
encourage software piracy and many of these websites
are now being targeted by the FBI. Today, the justice
system is addressing this cyber crime and there are
laws that prevent people from illegal downloading.
CYBER STALKING:
This is a kind of online harassment wherein the
victim is subjected to a barrage of online messages
and emails. Typically, these stalkers know their
victims and instead of resorting to offline stalking,
they use the Internet to stalk. However, if they notice
that cyber stalking is not having the desired effect,
they begin offline stalking along with cyber stalking to
make the victims’ lives more miserable.
IDENTITY THEFT:
This has become a major problem with people using the
Internet for cash transactions and banking services. In
this cyber crime, a criminal accesses data about a
person’s bank account, credit cards, Social Security,
debit card and other sensitive information to siphon
money or to buy things online in the victim’s name. It can
result in major financial losses for the victim and even
spoil the victim’s credit history.
CHILD SOLICITING AND ABUSE:
This is also a type of cyber crime wherein
criminals solicit minors via chat rooms for the
purpose of child pornography. The FBI has been
spending a lot of time monitoring chat rooms
frequented by children with the hopes of reducing
and preventing child abuse and soliciting.
MALICIOUS SOFTWARE:
These are Internet-based software or programs
that are used to disrupt a network. The software
is used to gain access to a system to steal
sensitive information or data or causing damage
to software present in the system.
STRATEGIES TO REDUCE
CYBERCRIME
CYBERCRIME REPORTING AND
INTELLIGENCE:
Reporting channels should be established to allow users
but also public and private sector organisations report
cybercrime. This will enhance the understanding of
scope, threats and trends and the collation of data to
detect patterns of organised criminality. Given the fast
evolution of technologies and with it cybercrime and
techniques used by criminals, building intelligence is of
particular importance to assess threats and predict
trends, and thus to help adjust measures against
strategies.
PREVENTION:
Public education and awareness, the empowerment of
users and technical and other measures should be
essential elements of cybercrime strategies. Specific
measures should be envisaged for the online
protection children44 and for fraud prevention.
LEGISLATION:
States should adopt legislation that is harmonized with
international standards46 in order to:
•criminalize conduct
•provide law enforcement with procedural law tools for efficient
investigations
•establish safeguards and conditions limiting investigative
powers as well as adopting data protection regulations.
HIGH-TECH CRIME AND OTHER
SPECIALIZED UNITS:
Specialized units, such as high-tech crime units,
prosecution services responsible for cybercrime and
services for cyber forensics will need to be created.
INTERAGENCY COOPERATION:
Cybercrime is not the sole responsibility of a specific
(specialized) unit. For example, high-tech crime units may
provide support to other services investigating fraud, money
laundering or child pornography, or cooperate with CERTS
or other institutions responsible for cyber security. Specific
procedures and mechanisms for interagency cooperation
would need to be established
LAW ENFORCEMENT TRAINING:
The objective of a specific law enforcement training strategy
could be to ensure that law enforcement officers have the
skills/competencies necessary for their respective functions
to investigate cybercrime, secure electronic evidence and
carry out computer forensics analyses for criminal
proceedings to assist other agencies to contribute to
network security. The first step towards such a training
strategy would be a training needs analysis (covering
requirements from first responders to generic investigators,
specialist investigators, internet crime investigators, covert
internet crime investigators, network crime investigators,
digital forensic investigators and managers).
JUDICIAL TRAINING:
A judicial training concept should ensure that all judges and
prosecutors have at least basic knowledge to deal with
cybercrime and electronic evidence. This means that such
training needs to be integrated into the regular judicial training
system of a country. A coherent concept would be required to
ensure this. The objectives could be: to enable training institutes
to deliver initial and in-service cybercrime training based on
international standards, to equip the largest possible number of
future and practicing judges and prosecutors with basic
knowledge on cybercrime and electronic evidence, to provide
advanced training to a critical number of judges and prosecutors,
to support the continued specialization and technical training of
judges and prosecutors to contribute to enhanced knowledge
through networking among judges and prosecutors, to facilitate
access to different training initiatives and networks.
PUBLIC/PRIVATE (LEA/ISP)
COOPERATION:
All cyber security strategies underline the need for
public/private cooperation. With respect to cybercrime,
cooperation between law enforcement and service providers
is particularly essential. Memoranda of Understanding or
other types of agreements could be considered to provide a
framework for efficient cooperation that defines
expectations, responsibilities, authorities but also limitations
and that ensures that the rights of users are protected.
Positive examples of public/private cooperation are
available and could be built upon.
EFFECTIVE INTERNATIONAL
COOPERATION:
Cybercrime is transnational crime involving multiple jurisdictions.
Efficient international police to police and judicial cooperation is
required to preserve volatile electronic evidence. This includes
direct cooperation between high-tech crime units and between
prosecutors of different countries. 24/7 points of contact in line with
Article 35 of Budapest Convention and as promoted by the G8
High-tech Crime Sub-group should be established. Chapter III of
the Convention on Cybercrime provides a legal framework for
international cooperation with general and specific measures,
including the obligation of countries to cooperate to the widest
extent possible, urgent measures to preserve data and efficient
mutual legal assistance. States should also consider accession to
this treaty to make use of these provisions.
FINANCIAL INVESTIGATIONS AND PREVENTION
OF FRAUD AND MONEY LAUNDERING:
Obtaining financial or other economic benefits has been one motivation of
cybercriminals from the very beginning. However, there is general agreement
that generating proceeds is now the primary purpose of cybercrime. The type of
cybercrime in this respect is fraud. Public authorities but also private sector
organisations should pay particular attention to the prevention of fraud and
money laundering but also to financial investigations to search, seize and
confiscate proceeds from cybercrime. Such measures may include cybercrime
reporting systems; prevention and public awareness; regulation licensing and
supervision; risk management and due diligence, harmonization of legislation,
interagency cooperation, public/private cooperation and information exchange56
and other measures.
PROTECTION OF CHILDREN:
Empowering children and fostering their trust and confidence in
the Internet together with the protection of their dignity, security
and privacy requires a comprehensive set of measures that go
beyond the scope of cybercrime or cyber security strategies.
However, special attention is to be paid to the prevention and
control of the sexual exploitation and abuse of children. The
Lanzarote Convention on the Protection of Children against
Sexual Exploitation and Sexual Abuse provides a framework for a
comprehensive set of measures. Countries need criminalize child
pornography and other conduct in line with international standards
and establish the conditions for effective enforcement.
DIGITAL FORENSICS
INTRODUCTION:
Digital forensic techniques involve the application of science to the
identification, collection, examination, and analysis of data in ways that
preserve the integrity of the information and maintain a strict chain of custody
for the data. Organizations have the means to collect growing amounts of
data from many sources. Data is stored or transferred by standard IT
systems, networking equipment, computing peripherals, personal digital
assistants (PDAs), consumer electronic devices, and various types of media.
When information security incidents occur, organizations that have
established a capability to apply digital forensic techniques can examine and
analyze the data that they have collected, and determine if their systems and
networks may have sustained any damage and if sensitive data may have
been compromised. Digital forensic techniques can be used for many
purposes, such as supporting the investigation of crimes and violations of
internal policies, analyses of security incidents, reviews of operational
problems, and recovery from accidental system damage.
ROLES & CAPABILITIES:
•The collection, preservation, analysis, and presentation of digital
evidence.
•Admissible in a court of law
•Usable for internal disciplinary hearings
•Supporting data for internal incident reports
•Assisting/furthering other investigations.
•Shows possession/handling of digital data
•Show use/abuse of IT infrastructure & services
•Shows evidence of policy violation or illegal activity
DIGITAL FORENSICS PROCESS:
DATA SHARING OF CYBER THREATS 
CONFIDENTIALITY:
Confidential information must only be
accessed, used, copied, or disclosed by
users who have been authorized.
INTEGRITY:
Integrity means data can not be created, changed, or
deleted without proper authorization.
AUTHENTICITY:
Authenticity is necessary to ensure that the
users or objects (like documents) are genuine
(they have not been forged or fabricated).
AVAILABILITY:
Availability means that the information, the
computing systems used to process the
information, and the security controls used to
protect the information are all available and
functioning correctly when the information is
needed.
NON-REPUDIATION:
When one party of a transaction cannot deny
having received a transaction nor can the other
party deny having sent a transaction.
COMBATING CYBERCRIMES THROUGH
SURVEILLANCE 
SEPARATE PERSONAL AND BUSINESS:
Consider using a separate computer from your personal one
for business use. And with that computer, only use it for
business purposes. Never surf the Internet or read personal
emails.
ONLY OPEN WHAT YOU TRUST:
Do not click on links in emails and be careful where you
surf online. I only click on links sent to me by people I
know and trust. And on my work PC, I don't even click on
links from my parents! I forward their emails to my
personal email and open them on one of my personal
devices.
STAY UP-TO-DATE:
Make sure that you educate yourself on different types of
social engineering because many times it can lead to
attempted fraud. In fact, there is a new type of fraud
called 'imposter fraud' where bad guys get into a
company's business communications, usually email,
impersonate a trusted executive and then instruct
accounts payable to transfer money to a fraudulent bank
account. The scale of the losses from imposter fraud can
be eye watering.
A WI-FI CONNECTION COULD UNDERMINE
YOUR ENTIRE NETWORK:
Baez related the story of a physician who was allowing patients to
access Wi-Fi while they waited to see him. The Wi-Fi network was
using the same infrastructure as his office's PC. The doctor didn't
realize that any one of those patients could easily tap into his
network, access other patients' files and insurance information,
and just plain wreak havoc. Baez suggests instead setting up your
Wi-Fi access through an inexpensive Internet line separate from
your company network.
NETWORK USERS ARE OFTEN A COMPANY'S
WEAKEST LINK:
Most of us use passwords that are a combination of simple words or
personal information. It only takes seconds for today's mobile
processors to crack the code. Add to that the countless employees
who write their corporate passwords on laptops and mobile devices
that can be easily stolen or simply lost. If your organization's data
security is vital, Baez suggests investing in Factor authentication
which open-source software has made affordable to many an
entrepreneur.
DON'T USE THE SAME PASSWORD FOR
YOUR VARIOUS ONLINE ACCOUNTS:
Change them regularly on Twitter and LinkedIn, as well as your
personal accounts. Baez cited the tale of Palo Alto developer
Naoki Hiroshima whose prized, single-digit Twitter account was
hacked and his entire business life brought to a screeching halt.
Baez recommends investing in password managers such as
1Password or Last Pass. They'll assure that extra degree of
security.
CONCLUSION 
As someone rightly said that “bytes are replacing bullets in the crime
world”. The growth of cyber crime all over the world, is on the rise and to
curb its scope and complexity is the pertinent need today. Cyber space
offers a plethora of opportunities for cyber criminals either to cause harm
to innocent people, or to make a fast buck at the expense of unsuspecting
citizens. Cybercrime investigations are not easy. This is mainly due to the
lack of what is called “cyber forensics.” We know that forensic evidence is
important in normal criminal investigations. But the collection and
presentation of electronic evidence to prove cyber crimes have posed a
challenge to investigation and prosecution agencies and the judiciary.
To sum up, cyber security needs a good combination of laws and
technology while keeping in mind common security standards. In the era of
e-governance and e-commerce, a lack of common security standards can
create havoc for global trade as well as military matters.

Más contenido relacionado

La actualidad más candente (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 

Destacado

20130321 Cybercrime threats on e-commerce online shops
20130321 Cybercrime threats on e-commerce online shops20130321 Cybercrime threats on e-commerce online shops
20130321 Cybercrime threats on e-commerce online shopsLuc Beirens
 
content & pipe
content & pipecontent & pipe
content & pipeMila
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Reportprashant3535
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Chapter 7 : MAKING MULTIMEDIA
Chapter 7 : MAKING MULTIMEDIAChapter 7 : MAKING MULTIMEDIA
Chapter 7 : MAKING MULTIMEDIAazira96
 

Destacado (7)

20130321 Cybercrime threats on e-commerce online shops
20130321 Cybercrime threats on e-commerce online shops20130321 Cybercrime threats on e-commerce online shops
20130321 Cybercrime threats on e-commerce online shops
 
content & pipe
content & pipecontent & pipe
content & pipe
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Report
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Chapter 7 : MAKING MULTIMEDIA
Chapter 7 : MAKING MULTIMEDIAChapter 7 : MAKING MULTIMEDIA
Chapter 7 : MAKING MULTIMEDIA
 

Similar a Cyber crime in the digital age

Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardGokul Alex
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Invest Northern Ireland
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...sabrangsabrang
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in IraqAyub Nuri
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethicssyed ahmed
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 

Similar a Cyber crime in the digital age (20)

Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
 
Cybercrime Surveillance.docx
Cybercrime Surveillance.docxCybercrime Surveillance.docx
Cybercrime Surveillance.docx
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Lawek mui
Lawek muiLawek mui
Lawek mui
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethics
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Más de Saman Sara

Transgender employees
Transgender employeesTransgender employees
Transgender employeesSaman Sara
 
The need for security
The need for securityThe need for security
The need for securitySaman Sara
 
The future of learning
The future of learningThe future of learning
The future of learningSaman Sara
 
The Apple Experience
The Apple ExperienceThe Apple Experience
The Apple ExperienceSaman Sara
 
Technology is a double edged weapon
Technology is a double edged weaponTechnology is a double edged weapon
Technology is a double edged weaponSaman Sara
 
Strategy and Tactics
Strategy and TacticsStrategy and Tactics
Strategy and TacticsSaman Sara
 
Social media dangers
Social media dangersSocial media dangers
Social media dangersSaman Sara
 
Purpose Driven Marketing
Purpose Driven MarketingPurpose Driven Marketing
Purpose Driven MarketingSaman Sara
 
Nachfrist for late performance
Nachfrist for late performanceNachfrist for late performance
Nachfrist for late performanceSaman Sara
 
Mental Health & Technical Possibilities
Mental Health & Technical PossibilitiesMental Health & Technical Possibilities
Mental Health & Technical PossibilitiesSaman Sara
 
Failed technologies and investment under uncertainty
Failed technologies and investment under uncertaintyFailed technologies and investment under uncertainty
Failed technologies and investment under uncertaintySaman Sara
 
Change Agility
Change AgilityChange Agility
Change AgilitySaman Sara
 
Colorism and socioeconomic status
Colorism and socioeconomic statusColorism and socioeconomic status
Colorism and socioeconomic statusSaman Sara
 
The effect of number of concepts on readability of schemas 2
The effect of number of concepts on readability of schemas 2The effect of number of concepts on readability of schemas 2
The effect of number of concepts on readability of schemas 2Saman Sara
 

Más de Saman Sara (17)

Hub savers
Hub saversHub savers
Hub savers
 
Transgender employees
Transgender employeesTransgender employees
Transgender employees
 
The need for security
The need for securityThe need for security
The need for security
 
The future of learning
The future of learningThe future of learning
The future of learning
 
The Apple Experience
The Apple ExperienceThe Apple Experience
The Apple Experience
 
Technology is a double edged weapon
Technology is a double edged weaponTechnology is a double edged weapon
Technology is a double edged weapon
 
Strategy and Tactics
Strategy and TacticsStrategy and Tactics
Strategy and Tactics
 
Social media dangers
Social media dangersSocial media dangers
Social media dangers
 
Purpose Driven Marketing
Purpose Driven MarketingPurpose Driven Marketing
Purpose Driven Marketing
 
Nachfrist for late performance
Nachfrist for late performanceNachfrist for late performance
Nachfrist for late performance
 
Mental Health & Technical Possibilities
Mental Health & Technical PossibilitiesMental Health & Technical Possibilities
Mental Health & Technical Possibilities
 
Failed technologies and investment under uncertainty
Failed technologies and investment under uncertaintyFailed technologies and investment under uncertainty
Failed technologies and investment under uncertainty
 
Change Agility
Change AgilityChange Agility
Change Agility
 
Colorism and socioeconomic status
Colorism and socioeconomic statusColorism and socioeconomic status
Colorism and socioeconomic status
 
The effect of number of concepts on readability of schemas 2
The effect of number of concepts on readability of schemas 2The effect of number of concepts on readability of schemas 2
The effect of number of concepts on readability of schemas 2
 
She crate
She crateShe crate
She crate
 
My Portfolio
My PortfolioMy Portfolio
My Portfolio
 

Último

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Cyber crime in the digital age

  • 1. CYBER CRIMECYBER CRIME IN THE DIGITAL AGEIN THE DIGITAL AGE   STRATEGIES & SOLLUTIONSSTRATEGIES & SOLLUTIONS
  • 2. CYBER CRIME: THE INTRODUCTION  In a digital age, where online communication has become the norm, internet users and governments face increased risks of becoming the targets of cyber attacks. As cyber criminals continue to develop and advance their techniques, they are also shifting their targets — focusing less on theft of financial information and more on business espionage and accessing government information. To fight fast-spreading cyber crime, governments must collaborate globally to develop an effective model that will control the threat.
  • 4. HACKING: This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed. In the United States, hacking is classified as a felony and punishable as such. This is different from ethical hacking, which many organizations use to check their Internet security protection. In hacking, the criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location.
  • 5. THEFT: This crime occurs when a person violates copyrights and downloads music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI. Today, the justice system is addressing this cyber crime and there are laws that prevent people from illegal downloading.
  • 6. CYBER STALKING: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims’ lives more miserable.
  • 7. IDENTITY THEFT: This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history.
  • 8. CHILD SOLICITING AND ABUSE: This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography. The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting.
  • 9. MALICIOUS SOFTWARE: These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system.
  • 11. CYBERCRIME REPORTING AND INTELLIGENCE: Reporting channels should be established to allow users but also public and private sector organisations report cybercrime. This will enhance the understanding of scope, threats and trends and the collation of data to detect patterns of organised criminality. Given the fast evolution of technologies and with it cybercrime and techniques used by criminals, building intelligence is of particular importance to assess threats and predict trends, and thus to help adjust measures against strategies.
  • 12. PREVENTION: Public education and awareness, the empowerment of users and technical and other measures should be essential elements of cybercrime strategies. Specific measures should be envisaged for the online protection children44 and for fraud prevention.
  • 13. LEGISLATION: States should adopt legislation that is harmonized with international standards46 in order to: •criminalize conduct •provide law enforcement with procedural law tools for efficient investigations •establish safeguards and conditions limiting investigative powers as well as adopting data protection regulations.
  • 14. HIGH-TECH CRIME AND OTHER SPECIALIZED UNITS: Specialized units, such as high-tech crime units, prosecution services responsible for cybercrime and services for cyber forensics will need to be created.
  • 15. INTERAGENCY COOPERATION: Cybercrime is not the sole responsibility of a specific (specialized) unit. For example, high-tech crime units may provide support to other services investigating fraud, money laundering or child pornography, or cooperate with CERTS or other institutions responsible for cyber security. Specific procedures and mechanisms for interagency cooperation would need to be established
  • 16. LAW ENFORCEMENT TRAINING: The objective of a specific law enforcement training strategy could be to ensure that law enforcement officers have the skills/competencies necessary for their respective functions to investigate cybercrime, secure electronic evidence and carry out computer forensics analyses for criminal proceedings to assist other agencies to contribute to network security. The first step towards such a training strategy would be a training needs analysis (covering requirements from first responders to generic investigators, specialist investigators, internet crime investigators, covert internet crime investigators, network crime investigators, digital forensic investigators and managers).
  • 17. JUDICIAL TRAINING: A judicial training concept should ensure that all judges and prosecutors have at least basic knowledge to deal with cybercrime and electronic evidence. This means that such training needs to be integrated into the regular judicial training system of a country. A coherent concept would be required to ensure this. The objectives could be: to enable training institutes to deliver initial and in-service cybercrime training based on international standards, to equip the largest possible number of future and practicing judges and prosecutors with basic knowledge on cybercrime and electronic evidence, to provide advanced training to a critical number of judges and prosecutors, to support the continued specialization and technical training of judges and prosecutors to contribute to enhanced knowledge through networking among judges and prosecutors, to facilitate access to different training initiatives and networks.
  • 18. PUBLIC/PRIVATE (LEA/ISP) COOPERATION: All cyber security strategies underline the need for public/private cooperation. With respect to cybercrime, cooperation between law enforcement and service providers is particularly essential. Memoranda of Understanding or other types of agreements could be considered to provide a framework for efficient cooperation that defines expectations, responsibilities, authorities but also limitations and that ensures that the rights of users are protected. Positive examples of public/private cooperation are available and could be built upon.
  • 19. EFFECTIVE INTERNATIONAL COOPERATION: Cybercrime is transnational crime involving multiple jurisdictions. Efficient international police to police and judicial cooperation is required to preserve volatile electronic evidence. This includes direct cooperation between high-tech crime units and between prosecutors of different countries. 24/7 points of contact in line with Article 35 of Budapest Convention and as promoted by the G8 High-tech Crime Sub-group should be established. Chapter III of the Convention on Cybercrime provides a legal framework for international cooperation with general and specific measures, including the obligation of countries to cooperate to the widest extent possible, urgent measures to preserve data and efficient mutual legal assistance. States should also consider accession to this treaty to make use of these provisions.
  • 20. FINANCIAL INVESTIGATIONS AND PREVENTION OF FRAUD AND MONEY LAUNDERING: Obtaining financial or other economic benefits has been one motivation of cybercriminals from the very beginning. However, there is general agreement that generating proceeds is now the primary purpose of cybercrime. The type of cybercrime in this respect is fraud. Public authorities but also private sector organisations should pay particular attention to the prevention of fraud and money laundering but also to financial investigations to search, seize and confiscate proceeds from cybercrime. Such measures may include cybercrime reporting systems; prevention and public awareness; regulation licensing and supervision; risk management and due diligence, harmonization of legislation, interagency cooperation, public/private cooperation and information exchange56 and other measures.
  • 21. PROTECTION OF CHILDREN: Empowering children and fostering their trust and confidence in the Internet together with the protection of their dignity, security and privacy requires a comprehensive set of measures that go beyond the scope of cybercrime or cyber security strategies. However, special attention is to be paid to the prevention and control of the sexual exploitation and abuse of children. The Lanzarote Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse provides a framework for a comprehensive set of measures. Countries need criminalize child pornography and other conduct in line with international standards and establish the conditions for effective enforcement.
  • 23. INTRODUCTION: Digital forensic techniques involve the application of science to the identification, collection, examination, and analysis of data in ways that preserve the integrity of the information and maintain a strict chain of custody for the data. Organizations have the means to collect growing amounts of data from many sources. Data is stored or transferred by standard IT systems, networking equipment, computing peripherals, personal digital assistants (PDAs), consumer electronic devices, and various types of media. When information security incidents occur, organizations that have established a capability to apply digital forensic techniques can examine and analyze the data that they have collected, and determine if their systems and networks may have sustained any damage and if sensitive data may have been compromised. Digital forensic techniques can be used for many purposes, such as supporting the investigation of crimes and violations of internal policies, analyses of security incidents, reviews of operational problems, and recovery from accidental system damage.
  • 24. ROLES & CAPABILITIES: •The collection, preservation, analysis, and presentation of digital evidence. •Admissible in a court of law •Usable for internal disciplinary hearings •Supporting data for internal incident reports •Assisting/furthering other investigations. •Shows possession/handling of digital data •Show use/abuse of IT infrastructure & services •Shows evidence of policy violation or illegal activity
  • 26. DATA SHARING OF CYBER THREATS 
  • 27. CONFIDENTIALITY: Confidential information must only be accessed, used, copied, or disclosed by users who have been authorized.
  • 28. INTEGRITY: Integrity means data can not be created, changed, or deleted without proper authorization.
  • 29. AUTHENTICITY: Authenticity is necessary to ensure that the users or objects (like documents) are genuine (they have not been forged or fabricated).
  • 30. AVAILABILITY: Availability means that the information, the computing systems used to process the information, and the security controls used to protect the information are all available and functioning correctly when the information is needed.
  • 31. NON-REPUDIATION: When one party of a transaction cannot deny having received a transaction nor can the other party deny having sent a transaction.
  • 33. SEPARATE PERSONAL AND BUSINESS: Consider using a separate computer from your personal one for business use. And with that computer, only use it for business purposes. Never surf the Internet or read personal emails.
  • 34. ONLY OPEN WHAT YOU TRUST: Do not click on links in emails and be careful where you surf online. I only click on links sent to me by people I know and trust. And on my work PC, I don't even click on links from my parents! I forward their emails to my personal email and open them on one of my personal devices.
  • 35. STAY UP-TO-DATE: Make sure that you educate yourself on different types of social engineering because many times it can lead to attempted fraud. In fact, there is a new type of fraud called 'imposter fraud' where bad guys get into a company's business communications, usually email, impersonate a trusted executive and then instruct accounts payable to transfer money to a fraudulent bank account. The scale of the losses from imposter fraud can be eye watering.
  • 36. A WI-FI CONNECTION COULD UNDERMINE YOUR ENTIRE NETWORK: Baez related the story of a physician who was allowing patients to access Wi-Fi while they waited to see him. The Wi-Fi network was using the same infrastructure as his office's PC. The doctor didn't realize that any one of those patients could easily tap into his network, access other patients' files and insurance information, and just plain wreak havoc. Baez suggests instead setting up your Wi-Fi access through an inexpensive Internet line separate from your company network.
  • 37. NETWORK USERS ARE OFTEN A COMPANY'S WEAKEST LINK: Most of us use passwords that are a combination of simple words or personal information. It only takes seconds for today's mobile processors to crack the code. Add to that the countless employees who write their corporate passwords on laptops and mobile devices that can be easily stolen or simply lost. If your organization's data security is vital, Baez suggests investing in Factor authentication which open-source software has made affordable to many an entrepreneur.
  • 38. DON'T USE THE SAME PASSWORD FOR YOUR VARIOUS ONLINE ACCOUNTS: Change them regularly on Twitter and LinkedIn, as well as your personal accounts. Baez cited the tale of Palo Alto developer Naoki Hiroshima whose prized, single-digit Twitter account was hacked and his entire business life brought to a screeching halt. Baez recommends investing in password managers such as 1Password or Last Pass. They'll assure that extra degree of security.
  • 40. As someone rightly said that “bytes are replacing bullets in the crime world”. The growth of cyber crime all over the world, is on the rise and to curb its scope and complexity is the pertinent need today. Cyber space offers a plethora of opportunities for cyber criminals either to cause harm to innocent people, or to make a fast buck at the expense of unsuspecting citizens. Cybercrime investigations are not easy. This is mainly due to the lack of what is called “cyber forensics.” We know that forensic evidence is important in normal criminal investigations. But the collection and presentation of electronic evidence to prove cyber crimes have posed a challenge to investigation and prosecution agencies and the judiciary. To sum up, cyber security needs a good combination of laws and technology while keeping in mind common security standards. In the era of e-governance and e-commerce, a lack of common security standards can create havoc for global trade as well as military matters.