0% found this document useful (0 votes)
37 views32 pages

Computer Crimes

Uploaded by

Nurul Nadia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views32 pages

Computer Crimes

Uploaded by

Nurul Nadia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

TTTT3013

COMPUTER ETHICS AND SOCIAL

COMPUTER CRIMES

1
COMPUTER

Provides :
- Facilities
- Facilitate criminal activities

2
Computer creates new form of crimes

E.g: No need to go to bank to steal money – ATM card


clone, break security code – transfer money from other
people’s

3
Definition:

as a crime where a computer is the object of the crime or is


used as a tool to commit an offense.
cybercriminal may use a device to

- access a user’s personal information, confidential business


information, government information,
- disable a device, or
- to sell or elicit the above information online.

4
Two categories of Cyber Crimes

Crimes that target Crimes using devices to


networks or devices participate in criminal
activities
Virus Phishing Emails
Malware Cyberstalking
DoS Attacks Identity Theft

Three levels of Cyber Crimes:


1. Property
2. Individual
3. Government
5
1. Property Level

• similar to a real-life instance of a criminal illegally


possessing an individual’s bank or credit card details.

• The hacker steals a person’s bank details to:


• gain access to funds,
• make purchases online or
• run phishing scams to get people to give away their
information, or also
• use a malicious software to gain access to a web
page with confidential information.

6
2. Individual Level

• involves one individual distributing malicious or illegal


information online.

• include :
• cyberstalking,
• distributing pornography and
• trafficking.

7
3. Government Level

• the least common cybercrime, but is the most serious


offense.
• A crime against the government is also known as cyber
terrorism.
• Government cybercrime includes:
• hacking government websites,
• military websites or
• distributing propaganda.
• These criminals are usually terrorists or enemy
governments of other nations.

8
Types of Cyber Crime
Types Description
DDoS Attacks to make an online service unavailable and take the
network down by overwhelming the site with traffic from
a variety of sources
Botnets networks from compromised computers that are
controlled externally by remote hackers
Identity Theft occurs when a criminal gains access to a user’s
personal information to steal funds, access confidential
information, or participate in tax or health insurance
fraud.
Cyberstalking involves online harassment where the user is subjected
to a plethora of online messages and emails.
PUPs Potentially Unwanted Programs are less threatening
than other cybercrimes, but are a type of malware

9
Types of Cyber Crime
Types Description
Social Engineering involves criminals making direct contact with you usually by
phone or email.
to gain your confidence and usually pose as a customer
service agent so you’ll give the necessary information needed
Phishing involves hackers sending malicious email attachments or
URLs to users to gain access to their accounts or computer
Prohibited/Illegal involves criminals sharing and distributing inappropriate
Content content that can be considered highly distressing and
offensive
Online Scams usually in the form of ads or spam emails that include
promises of rewards or offers of unrealistic amounts of
money
Exploit Kits need a vulnerability (bug in the code of a software) in order to
gain control of a user’s computer.
They are readymade tools criminals can buy online and use
against anyone with a computer.

10
New crimes challenges to:

• Prosecute criminals
• Prevent crimes to happen
• Trace criminal evidence and activities

11
Is Cyber Crimes Exist?

• Cyber crime– encompasses any criminal act dealing


with computers and networks (called hacking).
• Additionally, cyber crime also includes traditional crimes
conducted through the Internet.
• For example;
• hate crimes, telemarketing and Internet fraud, identity
theft, and credit card account thefts are considered to
be cyber crimes when the illegal activities are
committed through the use of a computer and the
Internet.

12
Computer Crime Vs Cyber Crime

• Computer capable of implementing a conventional criminal


activities eg: fraud, theft, intrusion
• normally, known as cyber crime, but:
• Computer crime includes a variety of crimes that use
computers as a tool . Need direct hub between criminals
and the comp. Eg . Download data directly from the
comp . through LANS
• can not occur without an Internet connection. Eg.
Pornography , fraud via websites and pornographic
material via e-mail

13
1996 – Cyber Law, the Provisions are:

Computer Crime Laws

Invasion/intrusion Sek. 5 Computer Crime Act

Repeated harassment or Sek. 232 Communication and


sexual harassment Multimedia Act

Threats or defamation by Sek. 233 Communication and


email multimedia act
Sek. 500 Penal Code

14
Cyber Crimes and Risks

Type Objective Source Risk freq


of
crime
Hacker Test system limits and publicity Limited Min high

Cracker Cause trouble, steal data, Limited Med Med


corrupt system
Insider Profit/money, interrupt company System & Med Low
info system password
Spy/intelligenc Steal secret trades and gain Funded & Min Low
e spy benefits trained
Cyber crime Get profit Funded & Med Low
trained
Cyber terrorist Destruct main infrastructure Non High Low
component necessarily
funded nor
trained

15
Computer Crime and Security

• Security is the ability of a system to protect information


and system resources with respect to confidentiality and
integrity.”
• Note that the scope of this second definition includes
system resources, which include CPUs, disks, and
programs, in addition to information.
• In a generic sense, security is "freedom from risk or
danger."

16
Computer Crime and Security

• In the context of computer science, security is the


prevention of, or protection against,
• access to information by unauthorized recipients, and
• intentional but unauthorized destruction or alteration
of that information

• Attackers/ intruders activities → information war

17
Computer Crime and History

• 1970s - The malicious tie to hacking was first documented


when early computerized phones were becoming a target.
• Tech-savvy people known as “phreakers” found a way
around paying for long distance calls through a series
of codes – first hackers
• made people realize that computer systems were
vulnerable to criminal activity
• 1990s - large project named Operation Sundevil was
exposed.
• FBI agents confiscated 42 computers and
• over 20,000 floppy disks that were used by criminals
for illegal credit card use and telephone services.
18
Impact of Cyber crime on Society

• created a major threat to those who use the internet.


• major dent in many nations’ economies
• Examples:
• The global cost of cybercrime will reach $6 trillion by 2021.
• organizations that suffered at least one breach in 2016 lost an
average of $4 million (Ponemon Institute, 2016).
• 48% of data security breaches are caused by acts of malicious
intent.
• Cybersecurity Ventures expects ransomware costs will rise
to $11.5 billion in 2019
• Cybercrime will more than triple the number of unfilled
cybersecurity jobs by 2021.

19
Impact of Cyber crime on Society

• Examples of giant companies being hacked:


• Pentagon
• Citibank
• Various local banks such as CIMB, Maybank
• Australian Telecom
• Nasa

20
How to Fight Cyber Crime?

• Become vigilant when browsing websites.


• Flag and report suspicious emails.
• Never click on unfamiliar links or ads.
• Use a VPN whenever possible.
• Ensure websites are safe before entering credentials.
• Keep antivirus/application systems up to date.
• Use strong passwords with 14+ characters.

21
Cyber Issues on Social Media

1. TikTok
- more than a billion and a half downloads and revenue of $40 million per
month, TikTok is aiming to be soon one of the most popular apps in the
world.
- Business Insider calls TikTok “the next frontier in social media not just
for influencers, but for marketers and advertisers,”
Dangers on TikTok
- Prone to addiction
- Video challenges – injuring kids across the country
- Privacy concerns - ByteDance is a Chinese company, and the data collected by them that
includes biometric scans of faces may end up being used by the communist party ruling in
China. TechCrunch recently pointed out that ByteDance has secretly built a deepfakes maker
that could one day be used in TikTok. Military personnel can still access the app as long as it is
installed on a personal smartphone but are strongly advised to defer from it (Pandasecurity, 2020)

22
Cyber Issues on Social Media

2. Whatsapp spyware is being used to curtail the freedom


of the press in India (Pandasecurity, 2019)
- WhatsApp has contacted approximately 50 Indian account holders to
advise they had been compromised. Each person’s phone had been
infected by Pegasus spyware.
- The Indian government - using spyware to monitor their opponents and
to track dissidents. The deliberate infection of smartphones is invasion
of privacy, attempt to stifle free speech and political opposition.
- The Citizen Lab - the Saudi Arabian government also used Pegasus to
monitor the communications of the assassinated journalist Jamal
Khashoggi.
- At least six countries are using Pegasus to target civil society : Bahrain,
Kazakhstan, Mexico, Morocco and United Arab Emirates are all
committing potential human rights abuses uses mobile spyware.

23
Cyber Issues on Social Media

3. Instagram flaw exposes private information


- Every single webpage on the internet has an address
- Your private Instagram posts also have an address – it’s just not
immediately visible. But it can be found very, very easily.
- Most web browsers (Chrome, Safari, Firefox, Edge) include basic
development tools that allow you to view the code which define how the
page looks. And by viewing the page source code, you can quickly and
easily find the address of ‘private’ posts and images.
- Once you have the address, it can be reshared on social media, or in
messages and emails. And anyone who clicks the link can see your
private posts, even if they don’t follow you.
- Researchers have also discovered that ‘deleted’ posts can still be
accessed using these hidden addresses. And this is also true of private
posts that are set to auto-delete after 24 hours.

24
Cyber Issues on Social Media

3. Instagram flaw exposes private information

- A timely privacy reminder. Although anyone can see your


private content using one of these links, only the recipient
of your private messages can access its address. Sharing
private posts can only be done by someone you trust.

- BUT, few things you need to remember:


- Facebook has a track record of poor privacy
protection
- Nothing is ever really deleted
- Private today, public tomorrow

25
Cyber Issues on Social Media

4. Cyberbullying
- 5 reasons kids don’t report cyberbullying:
- Fear of retaliation
- Don’t recognized bullying
- Feel ashamed
- Unsure of adult’s reaction
- Think no one will believe them or help

26
How to Clean Your Social Media

4 Tips for Cleaning Up Your Facebook

• Update your About Section


• Evaluate your Photos
• Audit your Posts and Likes
• Timeline → More → Likes → Edit accordingly
• Check your Privacy Settings
• Facebook App on Mobile → Settings → Privacy →
Location → Never share
• Settings →Timeline and Tagging → Review → On

27
How to Clean Your Social Media

What Data Does Facebook Collect?


• Information and content you provide
• Networks and connections
• Your usage
• Information about transactions made
• Things others do and information they provide about you
• Device attributes
• Device operations
• Device identifiers
• Device signals
• Data from device settings
• Network and Connections
• Cookie Data
• Information from partners

28
How to Clean Your Social Media

What happens when you delete Facebook?


• After the Facebook data breach, there was a call to #deletefacebook.
• There is a difference between deactivating and deleting a Facebook account.
• deactivate - people won’t be able to see your timeline or search for you but there
will still be traces of your account, such as messages you’ve sent. If you
deactivate, you can reactivate whenever you want.
• Deleting your account will mean that you no longer have access. The deletion will
take a few days and if you log back on during that time, the deletion request will
be cancelled. It can take up to 90 days to completely delete the data that is
stored in backup systems.
• Copies of some information like log records may still remain in the Facebook database,
but they are dissociated from personal identifiers.
• Data harvested by outside apps is not necessarily deleted. However, Facebook’s rules
state that developers must delete this data if a consumer asks them to. This will require
you to reach out to the developer to ensure the data is deleted.

29
30
31
32

You might also like