0% found this document useful (0 votes)
19 views30 pages

Chapter 1-Fundamentals of Cyber Crime - PRESENTATION

1

Uploaded by

yasmine chiter
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views30 pages

Chapter 1-Fundamentals of Cyber Crime - PRESENTATION

1

Uploaded by

yasmine chiter
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Ferhat Abbas University Setif 1

Faculty of Sciences
Department of Computer Science

Field: Mathematics and Computer Science


Sector: Computer Science
Specialization: Cybersecurity

Module: Cybercrime
Chapter 1: Fundamentals of Cyber
crime

L.GOUDJIL

2022-2023
Chapter 1: Fundamentals of Cybercrime

3. Terrestrial 1.Cybercrime
1. Definition of 2.Contemporary
Crimes Versus and White Collar
Cybercrime Cybercrime Cybercrimes Crime

3
I. Introduction
 Digital technology and cybercrime are pervasive features of modern life.

 Approximately 60% of the world’s population are internet users and


the global adoption of digital technology is rapidly increasing;

 Global internet penetration increased by approximately 7% over the


course of one year (from January 2020 to January 2021)

4
II. Definition of Cybercrime
 There is no universally accepte definition of Current definitions of
Cybercrime have evolved experientially.
 cybercrime.Like traditional crime, Cybercrime has many different
facets and occurs in a wide variety of scenarios an environments.

 They differ depending on the perception of both observer/protector


and victim and are partly a function of computer-related crimes'
geographic evolution.

5
II. Definition of Cybercrime

6
II. Definition of Cybercrime
 Example

 The Council of Europe’s Cybercrime Treaty uses the term “Cybercrime”


to refer to offenses ranging from criminal activity against data to content
and copyright infringement [13].
 However, Zeviar-Geese [22] suggests that the definition is broader, including
activities such as fraud, unauthorized access, child pornography, and
cyberstalking.

 The United Nations Manual on the Prevention and Control of


Computer Related Crime includes fraud, forgery, and unauthorized 7
access [19] in its cybercrime definition.
II. Definition of Cybercrime

8
II. Definition of Cybercrime
 Table. Organizational definitions of cybercrime.
Year Organization Definition of Cybercrime
1994 The United Nations “The United Nations manual [23] on the prevention and
control of
computer-related crime (1994) uses the terms, computer crime
and computer-related crime interchangeably. This manual did
not provide any definition” [18] (p. 116)
2000 1. “any illegal behaviour directed by means of electronic
The Tenth United Nations operations that target the security of computer systems and
Congress on the Prevention of the data processed by them.”
Crime and the Treatment of 2. “any illegal behaviour committed by means of, or in relation
Offenders to, a computer system or network, including such crimes as
illegal possession and offering or distributing information by
means of a computer system or network” [24] (p. 5
2001 “action directed against the confidentiality, integrity and
The Council of Europe availability of computer systems, networks and computer data
Cybercrime Convention as well as the misuse of such systems, networks and data by9
(also known as The providing for the criminalisation of such
Budapest Convention conduct” [25] (p. 2)
II. Definition of Cybercrime
 Table. Organizational definitions of cybercrime.
Year Organization Definition of Cybercrime
2007 The Commission of “criminal acts committed using electronic
European Communities communications networks and information systems or
against such networks and systems” [26] (p. 2)
2013 Shanghai Cooperation “the use of information resources and (or) the impact
Organization (SCO) on them in the informational sphere for illegal
Agreement purposes” (cited in Malby et al. [27] (p. 15))
2013 Cybersecurity Strategy of “a broad range of different criminal activities where
the computers and information systems are involved either
European Union as a primary tool or as a primary target” [28] (p. 3)
2016 Commonwealth of “a criminal act of which the target is computer
Independent information” (cited in Akhgar et al. [29] (p. 298))
States Agreement

10
III. Cybercrime vs traditional crime?
 Simply put, cyber crime is a crime committed using the means of
technology and the internet.

11
III. Cybercrime vs traditional crime?

 The Scale
 Attacks can be conducted on a scale not possible in the physical world. A
traditional bank robber may only be able to hit one or two banks a week, a
cyber-attack can target 100s if not 1000s of sites at once.

12
III. Cybercrime vs traditional crime?
 The Reach
 Attacks can be performed from anywhere in the world; they can be
performed anonymously and within jurisdictions where the consequences
of those actions may not, or cannot, be addressed by the criminal justice
system. Attackers are also able to extract far more data digitally than would
ever be possible in the physical world.

 For example 1 gigabyte of data is approximately 4,500 paperback books.


Think of how many gigabytes of data is held on a system, hackers can
extract this within a matter of minutes.
13
III. Cybercrime vs traditional crime?
 The Speed
 Attacks are conducted at machine speed; a criminal can write a piece of
code that can target multiple sites in minutes.

14
III. Cybercrime vs traditional crime?
 Perception and media effect

 There is another part of the cyber threat to be considered, the public and
media perception of cyber crime. When large financial institutions have
been hacked the media has often wholly apportioned blame to the
organisations rather than the criminals, this would not be the case in a
physical bank robbery.

15
IV. HISTORY OF CYBERCRIME
 1970-1995 – Kevin Mitnick-Kevin Mitnick penetrates some of the
highest-guarded networks in the world, including Nokia and Motorola,
leveraging specialized social engineering systems, tricking insiders into
handing codes and passwords over and using codes to breach internal
operating systems.
 1973 – Embezzlement-A local New York bank teller uses a machine to
embezzle more than $2 million.
 1982 – The Logic Bomb The CIA blows up a Siberian gas pipeline by
injecting a code into the network and the operating system to monitor the
gas pipeline without using a bomb or a missile.
16
IV. HISTORY OF CYBERCRIME
 1999 – The Melissa Virus-A virus infects Microsoft Word records,
transmitting itself via email as an attachment automatically. It mails
out to the first 50 names mentioned in the Outlook email address
box of an infected device.
 2000 – Barry Schlossberg, alias Lou Cipher, successfully extort $1.4
million from CD Universe for services given to the Russian hacker
in an effort to apprehend him.

17
IV. HISTORY OF CYBERCRIME
 2013-2015 – Global Bank Hack-More than 100 organizations
around the world have access to secure information from a
community of Russian-based hackers.
 2015 – On Android phones, LockerPin resets the pin code and
demands $500 from victims to unlock the system, claiming
personal data leakage on up to 78.8 million current and former
users.

18
IV. HISTORY OF CYBERCRIME
 2016 – DNC Email Leaks-Emails from the Democratic National
Committee were leaked to and released by WikiLeaks prior to the
2016 US presidential election.
 2017 – Equifax-Equifax is compromised, revealing 143 million
customer accounts, one of the biggest US credit bureaus. Social
Security numbers, birth dates, addresses, driver’s license numbers,
and certain credit card numbers are part of the confidential leaked
info.

19
V. Contemporary Cybercrime

20
V. Contemporary Cybercrime
 five-category typology described in Marcum and Higgins

21
VI. Who investigates cyber crime?
1. The victim
2. The victim's system and network security team.
3. Private investigators.
4. Law enforcement with jurisdiction.
5. Reporters
6. Sociologists
7. Threat intelligence vendors
8. Cybersecurity companies 22
VII. White-Collar Crime

 The term "white-collar crime" refers to financially


motivated, nonviolent or non-directly violent
crime committed by individuals, businesses and
government professionals.
 "a crime committed by a person of respectability
and high social status in the course of their
occupation". 23
VII. Differences Between White-Collar Crime
and Cybercrime
a number of similarities (and differences) exist between white collar
crime and cybercrime.
for now, it is safe to suggest that certain types of cybercrime cannot be
conceived of as white-collar crimes and certain types of cybercrime
cannot be conceived of as white-collar crimes. consider the following:
• cyberbullying in high school is a form of cybercrime, but it is not a
form of white-collar crime.
• child pornography is a form of cybercrime, but it is not a form of
white-collar crime.
24
VII. Differences Between White-Collar Crime
and Cybercrime
a number of similarities (and differences) exist between white collar
crime and cybercrime.
for now, it is safe to suggest that certain types of cybercrime cannot be
conceived of as white-collar crimes and certain types of cybercrime
cannot be conceived of as white-collar crimes. consider the following:
• cyberbullying in high school is a form of cybercrime, but it is not a
form of white-collar crime.
• child pornography is a form of cybercrime, but it is not a form of
white-collar crime.
25
VII. Differences Between White-Collar Crime
and Cybercrime
• cyber hacking might represent a form of white-collar crime in some
cases, but not in others.
• businesses that pollute the environment are committing a white-collar
crime, but not a cybercrime.
• businesses that engage in false advertising are committing a white-
collar crime, but not a cybercrime

26
VII. Types of White Collar Crime
Corporate Fraud
Corporate fraud can damage the economy as well as investor
confidence, the FBI points out. Many corporate fraud cases are
committed in finance or accounting. The goal is to mislead investors,
auditors, and other stakeholders about the financial success of a
company. This is done through manipulation of data, share price, and
other measures of financial health. Types of corporate fraud include:
 Falsification of financial information
 Self-dealing by corporate insiders
27
VII. Types of White Collar Crime
Corporate Fraud
 Falsification of financial information
 Self-dealing by corporate insiders

28
VII. Types of White Collar Crime
 Securities and Commodities Fraud
 This is carried out through forging documents
 altering account statements,
 illegal trading

29
VII. Types of White Collar Crime
 Money Laundering
 They might launder their money through real estate
ventures,
 international trade,
 financial institutions

30

You might also like