100% found this document useful (3 votes)
861 views43 pages

Introduction To Cybercrime and Environmental Laws & Protection

This document provides an introduction to cybercrime and environmental laws and protection. It discusses the history of computers and the internet, from the earliest mechanical computers in the 1930s-1940s to the development of personal computers in the 1980s. It describes key components of computers like hardware, software, input/output devices and storage media. It also defines cybercrime and outlines some common types of cybercrimes like computer hacking, viruses, and ransomware. The objectives are to discuss the development of information technology and summarize both the advantages and risks of these technologies.

Uploaded by

Sarah Jane Diaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
861 views43 pages

Introduction To Cybercrime and Environmental Laws & Protection

This document provides an introduction to cybercrime and environmental laws and protection. It discusses the history of computers and the internet, from the earliest mechanical computers in the 1930s-1940s to the development of personal computers in the 1980s. It describes key components of computers like hardware, software, input/output devices and storage media. It also defines cybercrime and outlines some common types of cybercrimes like computer hacking, viruses, and ransomware. The objectives are to discuss the development of information technology and summarize both the advantages and risks of these technologies.

Uploaded by

Sarah Jane Diaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 43

INTRODUCTION TO

CYBERCRIME AND
ENVIRONMENTAL LAWS
& PROTECTION
CDIN 329
LEARNING OBJECTIVES

• At the end of the unit, the students should be


able to:
• Discuss the historical development of
computer and internet.
• Summarize the advantages and risks of
information and communication technologies.
References
PCol Adelene Maghinay Florendo (PNP Ret),
PSSgt Rizza Ruth Maghinay Florendo, Introduction
to Cybercrime and Environmental laws and
Protection, Wiseman’s Book Trading, Inc., 2020
Martellozzo, Elena, ed (2017)Cybercrime and its
victims, Routledge, London
https://www.unodc.org/e4j/en/cybercrime/mod
ule-3/key-issues/intro.html

THE COMPUTER AND THE


INTERNET
History of the computer

• The computer as we know it today had its


beginning with a 19th century English
mathematics professor named Charles
Babbage
• He designed the Analytical Engine and it
was design that the framework of the
computers of todays are based on.
First generation: 1937 — 1946

• In 1937 the first electronic digital computer


was built by Dr. John V. Atanasoff and Clifford
Berry. It was called the Atanasoff-Berry
Computer (ABC).
• In 1943 an electronic computer name the
Colossus was built for the military. Other
developments continued
• until in 1946 the first general— purpose digital
computer, the Electronic Numerical Integrator
and Computer (ENIAC) was built.
Second generation: 1947 — 1962


• this generation of computers used
transistors instead of vacuum
tubes which were more reliable.
• In 1951 , the Universal Automatic
Computer (UNIVAC 1).
• In 1953 the International Business
Machine (IBM) 650 and 700 series
 Third generation: 1963 - present

• In1980 Microsoft Disk Operating


System (MS-Dos) was born
• in 1981 IBM introduced the personal
computer (PC) for home and office
use.
• Three years later Apple gave us the
Macintosh computer with its icon
driven interface and the 90s gave us
Windows operating system.
What does Computer mean?

•A machine or device that


performs processes,
calculations and operations
based on instructions provided
by a software or hardware
program.
Two primary categories:

1. Hardware: Physical structure


that houses a computer's
processor, memory, storage,
communication ports and
peripheral devices

2. Software: Includes operating


system (OS) and software
applications
Input Devices - An Input device is any hardware
component that allows the user to enter data
into the computer.

Six of the most widely used input devices are:

1. Keyboard - You use the keyboard to type


letters, numbers and symbols Into the
computer.
2. Mouse - a pointing device that has a pointer
that changes into different shapes as you use
the mouse. You click the mouse by pressing
and releasing the button. This action allows
you to enter data when using a mouse.
3. Scanner- this input device copies from paper
into your computer.

4. Microphone -is usually used for voice input into


the computer.

5. Digital Camera -- allows you to take pictures


that you can input into your computer.

6. PC Video Camera -allows you take both video


and still images that you can input onto your
computer.
Output Devices - An output device is any hardware
component that gives information to the user.

Three commonly used output devices are as follow:

1. Monitor This output device displays your information


on a screen,
2. Printer This output device prints information on paper
This type of printed output is called a hard copy
3. Speaker Sound is the type of output you will get from
a speaker.
Storage Media

• keeps data, Information and


instructions for use in the future All
computers use storage to keep the
software that makes the hardware
work.
Common storage media are:

• Hard Drive
• Floppy disk
• CD & DVD
• USB Flash drive
Computer Care

• Keep Dust Away


• Keep Food Away
• Use Clean Hands
• Treat with Respect
• Keep Off
• Stop Virus Attack
• Handle with Care
History of Internet
• The Internet Timeline begins in 1962,
before the word 'Internet' is invented.
• The world's 10,000 computers are
primitive, although they cost hundreds
of thousands of dollars. They have only
a few thousand words of magnetic core
memory, and programming them is far
from easy.
• The online world then took on a more recognizable form
in 1990, when computer scientist Tim Berners Lee
invented the World Wide Web.
• Vint Cerf. Widely known as a "Father of the Internet".
• In December 1997, President Bill Clinton presented the
U.S. National Medal of Technology to Cerf and his
colleague, Robert E. Kahn, for founding and developing
the Internet.
• Michael Bauer, the original owner of Internet.org before
Facebook founder and CEO Mark Zuckerberg,
Internet

• "the Net," is a worldwide system of


computer networks

• It is also a means of connecting a computer


to any other computer anywhere in the
world via dedicated routers and servers.
Internet

• "the Net," is a worldwide system of


computer networks

• It is also a means of connecting a computer


to any other computer anywhere in the
world via dedicated routers and servers.
CYBERCRIME:
DEVELOPMENT AND
TYPES
What is Cybercrime?

• "Offenses that are committed against individuals or


groups of individuals with a criminal motive to
intentionally harm the reputation of the victim or cause
physical or mental harm, or loss, to the victim directly or
indirectly, using modern telecommunication networks
such as Internet (networks including but not limited to
Chat rooms, emails, notice boards and groups) and
mobile phones (Bluetooth/SMS/ MMS).”
Computer crime has two elements:

1.Computer
2.Crime
Cyber Threats: A Brief Timeline
1939 Alan Turing, the father of computer science, and
 The Bombe Gordon Welchman invent a code breaking machine
  called The Bombe to decipher German Enigma-
machine-encrypted secret messages during World War
II
 

1969
Computer engineers Ken Thompson and Dennis Ritchie
UNIX OS create the UNIX operating system, which later becomes
the backbone of computerized technical infrastructure.
1971 John Draper, a phone phreaker, uses a toy whistle
Cap'n Crunch from a cereal box to hack into the AT&T phone
  system and make free long-distance calls. Drapers
earns the nickname Captain Crunch.

1973 A teller at a local New York bank uses a computer


Embezzlement to embezzle more than $1.5 million dollars

1981 Ian Murphy, AKA Captain Zap, is the first person


First Cyber Crime convicted of a cyber crime. Zap hacked into the
Conviction AT&T network and changed internal clocks to
charge off-hours rates at peak times.
 
1982 The first computer virus, Elk Cloner, is created as a prank
First Computer by a 15-year-old high school student. It infected Apple II
Virus computers via floppy disk.
 
1985 Steve Katz becomes the senior security executive for
First CISO Citibank/Citigroup and JP Morgan, and is widely regarded
  as the world's first Chief Information Security Officer.
 
1986 Using the "honey pot tactic," Clifford Stoll lures the
Honey Pot Tactic intruder further into the network, collects data and tracks
  the intrusion. His efforts eventually lead to the arrest of
Markus Hess and several others in West Germany, who
were stealing and selling military passwords, software
and other data to the KGB.
1989 Robert Morris, a Cornell graduate student, releases the Morris
First Malicious worm. The worm spreads to about 6,000 computers via a
Internet Code connected network that predated the internet we know today..
 
1989 The first large-scale case of ransomware is spread via floppy disk.
First Ransomware Attack The malicious software is distributed to 20,000 attendees of the
  WHO AIDS conference. Once downloaded, the ransomware
encrypts files after the computer is rebooted a certain amount of
times.
1999 The Melissa virus interrupts more than a million email accounts
First Mass-Emailing Virus worldwide and causes an estimated $80 million in damage. The
  virus creator, New Jersey computer programmer David L. Smith,
served 20 months in federal prison and was fined $5,000. It is
regarded as the first successful mass-emailing virus.
 
1999 The Internet Fraud Complaint Center (IFCC) is created in partnership
IFCC Created with the National White Collar Crime Center. By 2002, the center
  received 75,000 complaints annually. One year later, reports jump to
9,000 per month.
2000 The first juvenile to serve jail time for hacking is sentenced. At
First Juvenile 16, Jonathan James plead guilty to illegally hacking into NASA,
Hacker in Jail the Pentagon and the Department of Defense.
 
2002 The FBI's Cyber Division is created to focus on traditional
FBI Cyber Division crimes such as fraud, identity theft and intellectual property
Created rights violations
   
2008 The National Cyber Investigative Joint Task Force is created by the FBI
NCIJTF to synchronize efforts across the law enforcement, intelligence
community and Department of Defense to identify and apprehend
 
cyber criminals.
2010 Google's intellectual property is stolen during a highly sophisticated
Google Theft attack by Chinese hackers.

2013 Target is breached during the busiest shopping season of the year – Nov.
Target Breach 27 through Dec. 15. Illegal hackers gain access to about 40 million credit
  card and debit card accounts by using stolen network credentials from a
third-party vendor to break into the retailer’s network.

2014 Cyber criminals steal account information from at least 500 million
Yahoo Breach Yahoo users. User information such as names, email addresses,
  telephone numbers, passwords and security questions were at risk
during the breach, which was not disclosed until two years later in 2016.

2014 56 million credit cards are compromised when illegal intruders install
Home Depot custom-built malware on self-checkout registers at Home Depot.
Breach
2014 83 million JP Morgan Chase accounts are compromised after
JP Morgan Chase Breach hackers gain access to the network by using stolen employee
login credentials.
2015 Nearly 79 million Anthem accounts are compromised and the
Anthem Hack breach is traced back to a phishing campaign, which allowed
  hackers to gain remote access after an Anthem user unknowingly
downloaded malicious software.
2017 WannaCry, a global ransomware attack, halts computer systems
WannaCry in more than 150 countries, affecting more than 300,000 people.
Hack

2018 144 universities based in the U.S. and 176 universities in 21


U.S. Universities Under foreign countries are attacked by Iranian hackers. The three-year
Cyber Attack campaign resulted in $3 billion in intellectual property loss, with
  31 terabytes of information being stolen.
CATEGORIES OF CYBER CRIME

1 The computer as a target: - using a computer to


attacks other computer.
Ex: Hacking, virus/worms attacks, DOS attack

2. The computer as a weapon: - using a computer to


commit real world crime
Ex: cyber terrorism, credit card fraud and
pornography
CYBERCRIME OFFENSES
1. Offenses against the confidentiality, integrity and availability of
computer data and systems, such as illegal access, illegal
interception, data interference, system interference, and misuse of
devoice;
2. Computer-related offenses, such as computer related forgery and
computer-related Fraud
3. Content-related offenses, such as offenses related to child
pornography; And
4. Copyright-related offenses, such as offenses related to copyright
infringements and related rights,
Types of Cybercrime Description

1. Financial Crimes Credit Card Frauds; Money Laundering


2. Cyber Pornography Pornographic Websites; Online distribution
3. Online Gambling Millions of websites, all hosted on servers
abroad, offer online gambling.

4. IP Crimes Software Piracy, Copyright Infringement;


Trademarks Violations; Theft of Computer
source Code.
5. Email Spoofing A spoofed email is one that appears to originate from one source
but actually has been sent from another source.
6. Cyber Defamation This occurs when defamation takes place with the help of
computers and/or the Internet. E.g. someone publishes
defamatory matter about another on a website.

7. Cyber Stalking This involves following a person's movements across the Internet
by posting messages (sometimes threatening) on bulletin boards
frequented by the victim, entering chat-rooms frequented by the
victim, constantly bombarding the victim with emails etc.

8.Unauthorized Access Also known as Hacking. Involves gaining access illegally to a


computer system or network and in some cases making
unauthorized use of this access. Hacking is also the act by which
other forms of cyber-crime (e.g., fraud, terrorism) are committed.
9. Theft Theft of any information contained in electronic form such as that
stored in computer hard disks, removal storage media, etc. Can
extend to identity theft.

10. Email Bombing This refers to sending a large number of emails to the victim
resulting in the victim's email account (in case of an individual) or
mail servers (in case of a company or an email service provider)
crashing.

11. Salami Attacks These attacks are often used in committing financial crime and are
based on the idea that an alteration, so Insignificant, would go
completely unnoticed in a single case. E.g. a bank employee inserts
a program, into the bank's servers, that deducts a small amount of
money (say 5 cents a month) from the account of every customer.
This unauthorized debt is likely to go unnoticed by an account
holder.
12. Denial of Service
(DNS) Attack This involves flooding a computer resource with more requests than it can
handle, causing the resource (e.g. a web server) to crash thereby denying
authorized users the service offered by the resource. Another variation to a
typical denial of service attack is known as a Distributed Denial of Service
(DDoS) attack wherein the perpetrators are many and are geographically
widespread. It is very difficult to control such attacks and is often used in acts
of civil disobedience.

13. Virus/worm Viruses are programs attach themselves to a computer or a file and then circulate
themselves to another files and to other computers on a network. They usually
affect the data on a computer either by altering or deleting. Worms, unlike viruses
do not need the host to attach themselves to. They merely make functional copies
of themselves and do this repeatedly till they eat up all the available space on a
computer’s memory.

14. Logic Bombs These are event dependent programs where programs kick into action only when
a certain event (known as trigger event) occurs.
15. Trojan Attacks An unauthorized program which functions from
inside what seems to be an authorized program,
thereby concealing what it is actually doing.

16. Web Jacking This occurs when someone forcefully takes control of
a website(by cracking the password and later
changing it).

17. Cyber-Terrorism Hacking designed to cause terror, like conventional


'e-terrorism is utilizes hacking to cause violence
against persons or property, or at least cause enough
harm to generate fear.
Cybersecurity

• is the collection of tools, policies, security


concepts, security actions, safeguards, training,
best guidelines, practices, risk assurance
management and approaches, that can be
used to protect the cyber environment
technologies and organization and user's
assets.
SAFETY TIPS TO CYBER CRIME

• Use antivirus Software


• Insert Firewalls
• Uninstall unnecessary software
• Maintain backup
• Check security settings
Cyberstalking

• the use of the Internet or other electronic means to


stalk or harass an individual group, or organization, It
may include false accusations, defamation, slander
and libel. It may also include monitoring, identity
theft, threats, vandalism, solicitation for sex, or
gathering information that may be used to threaten,
embarrass or harass.
Types of Stalkers

1.Rejected Stalker
2.Resentful Stalker
3.Predatory Stalker
4.Intimacy Seeker
5.Incompetent
6.Erotomania and Morbidly Infatuated

You might also like