Intro To Cybercrime
Intro To Cybercrime
Intro To Cybercrime
TO
CYBERCRIME
CRI 327/L
RA 10364 – Expanded the Anti-Trafficking in
Person Act
RA 9775 – Anti Child Pornography Act of
2009
RA 9208 – Anti-Trafficking in Persons Act
of 2003
G8
1. France
2. Germany
3. Italy
4. Japan
5. United Kingdom
6. United States
7. Canada
8. Russia
Botnet - collection of infected
computers
Spyware - enables the remote monitoring
of a computer user’s activities or
information on an individual’s computer
where this software has been installed
Keyloggers - records every keystroke of
the user and reports this information
back to its source
Kevin Poulsen - hacked under the
pseudonym ‘Dark Dante’
Richard D. Greenblatt - considered to
have founded the hacker community
Tom Knight - co-engineer of ARPANET
• Digital natives – people that were
brought into a world that was already
digital, spend large amounts of time
in digital environments, and use
technological resources in their day-
to- day lives
• Digital immigrants - those who were
born prior to the creation of the
Internet and digital technologies
• Kevin Mitnick - most notorious hackers
in internet history
• David L. Smith - first person ever
prosecuted for writing a computer
virus (Melissa virus)
Computer forensics has the following key
elements:
1. The use of scientific methods
2. Collection and preservation
3. Validation
4. Identification
5. Analysis and interpretation
6. Documentation and presentation
Allan Kotok – member of the famous MIT-
TMRC
Examples:
• Cyber harassment
• Identity theft
• Distribution of child pornography
• Credit card fraud
2. Property - stealing of data and
intellectual property
Examples:
• Hacking
• Virus transmission
• Phishing
3. Government - least common but is the
most serious offense; crime against the
government
Examples:
• Accessing confidential information
• Cyber warfare
• Pirated software
Hierarchy of Contemporary Cybercriminals
a. Script kiddies, also known as skidiots,
skiddie, or Victor Skill Deficiency
(VSD)
- the lowest life form of
cybercriminal, least sophisticated of
all cybercriminals
- inexperienced hackers who employ
scripts or other programs authored by
others to exploit security
vulnerabilities or otherwise
compromise computer systems
b. Cyberpunks
- individuals’ intent on wreaking havoc
c. Cybercriminal organizations
- groups comprised of criminally minded
individuals who have used the
Internet to communicate, collaborate,
and facilitate cybercrime
- motivations include those activities
associated with political extremism
or economic gain
d. Hackers or crackers
• Hackers or crackers
- those who target data which is
valuable on its face or directed at
data which may be used to further
TYPES OF HACKERS
1. Black hats- hackers who commit illegal
acts, and their main purpose is to harm
information systems, steal information,
etc.
2. Gray-hat hacker - falls between black-
and white-hat hackers who have shifting
or changing ethics depending on the
specific situation
3. White-hats - have the knowledge and
skills that would enable them to
function in the same way as black-hats,
but they decided to be on the right
side of the law; often cooperate with
e. Hacktivists
- emerged in the 1990s when the Cult of
the Dead Cow hacker coined the term
to describe their actions
- technological social movements
- for politically or socially motivated
purposes
TOOLKIT OF CYBERCRIMINALS
Virus Worm
1. HHD
- Hard Disk Drives
- sometimes referred to as the "C
drive“
2. SSD
- Solid State Drives
- a storage device that allows reading,
writing, and storing data permanently
without a constant power source
Persistent storage
- holds data stored in the computer even
after the power is disconnected
1. HHD
- Hard Disk Drives
- sometimes referred to as the "C
drive“
2. SSD
- Solid State Drives
- a storage device that allows reading,
writing, and storing data permanently
without a constant power source
Interfaces for input and output with user
- Input-Output Interface
- method which helps in transferring of
information between the internal
storage devices
Output devices
- monitor and printer
Input devices
- keyboard and mouse provide
Physical ports
- Network Interface Controller (NIC)
- allows communications between computers
connected via local area network (LAN)
as well as communications over large-
scale network through Internet Protocol
(IP).
External storage, and servers
- external hard drives
- flash drives (thumb drives)
- network-attached storage
Computer Software
- refers to a series of instructions
that performs a particular task
- the interpretation of binary byte
sequences represented by a listing of
instructions to the processors
Different Types of System Software
Translators
- a software application that helps you
translate text into a variety of
languages
Device Drivers
- programs used to help better
functionality of hardware devices
Utility Programs
- Format, Defragmentation, cleaning of
hard disk space & installing and
removing application programs from
computer
Operating System
- the primary interface between a user
The Convention on Cybercrime:
BUDAPEST CONVENTION