LECTURE1
LECTURE1
LECTURE1
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Contents
Cyberspace
Cyberspace is "the environment in which communication over computer networks occurs.“
And almost everybody in one way or the other is connected to it
Cybersecurity and Other Security Domains
Cyber Safety
Cyber Crime
13
Some Definitions
According to H.R. 4246 “Cyber Security Information
Act”:
More and more criminals are exploiting the speed, convenience and anonymity that
modern technologies offer in order to commit a diverse range of criminal activities.
However, we are now seeing an emerging trend with traditional organized crime
syndicates and criminally minded technology professionals working together and
pooling their resources and expertise
New Threats to the Information Age
• Computers can be used to perform many traditional criminal acts/ attacks.
– Distribution of child pornography
– Financial crimes
– Corporate espionage
– Exploitation
– Stalking
– Identity theft
Types of Attackers
11
Types of Harm
• Interception
– an unauthorized party (human or not)
gains access to an asset
• Interruption
– an asset becomes lost, unavailable, or
unusable
• Modification
– an unauthorized party changes the
state of an asset
• Fabrication
– an unauthorized party counterfeits an
asset
12
Kinds of Threats
• Kinds of threats:
– Interception
▪ an unauthorized party (human or not) gains access to an asset
– Interruption
▪ an asset becomes lost, unavailable, or unusable
– Modification
▪ an unauthorized party changes the state of an asset
– Fabrication
▪ an unauthorized party counterfeits an asset
Method—Opportunity--Motive
14
Attackers
• Attackers need MOM
–Method
Skill, knowledge, tools, etc. with which
to pull off an attack
–Opportunity
Time and access to accomplish an
attack
–Motive
Reason to perform an attack
16
C I
S
S = Secure
A
CIA or CIAAAN…
(other security components added to CIA)
Authentication
Authorization
Non-repudiation
…
Levels of Vulnerabilities / Threats
(reversed order to illustrate interdependencies)
• C) for data
▪ “on top” of s/w, since used by s/w
• B) for software
▪ “on top” of h/w, since run on h/w
• A) for hardware
Overview
• The major complications of cybercrime:
– Cybercrime has increased dramatically in recent years.
– There is a significant inconsistency in defining computer crime offenses.
– There is no systematic data collection procedure for cybercrimes.
– Offenses vary greatly in character.
A Developmental Perspective on a Growing
Problem (1 of 2)
• Much has changed since computers were first introduced.
– Few experts explored the potential to use computers to commit crimes in
the beginning.
– A pioneer in early research was Donn Parker.
A Developmental Perspective on a Growing
Problem (2 of 2)
• Much has changed since computers were first introduced.
– Other popular publications include The Cuckoo's Egg and Takedown.
– Most research focuses on the mechanics and techniques of computer
crime and not the offenders or offenses committed.
The Reality of Increased Cybervictimization
• Two trends drive the reality of increased cybervictimization:
– Increased use of computers
– Increased availability of technical information on virus creation and
computer hacking techniques
• Who poses the greatest threat?
– Insiders
– Outsiders –is increasing
Changes to Cybervictimization and the
Emergence of Cyber Terror
• The dynamics and processes involved in the productive of cyber crime and
cyber terrorism are virtually the same.
– The rise of cyber terrorism poses at least as grave a threat as cyber crime.
• Inferences from the National Infrastructure Protection Center (NI P C) data can
be made that cyber crime and cyber terrorism are on parallel tracks.
– Russia and cyberterrorism
– Stuxnet and Israel
The Costs of Cybercrime (1 of 2)
• Estimates of cost:
– Most estimates are derived from surveys of corporations and government
agencies.
– These estimate vary dramatically.
– It is very difficult to accurately calculate the costs across different
categories of crime.
– Many companies underreport crimes.
– There may be intentional or unintentional biases.
The Costs of Cybercrime (2 of 2)
• Early AB A and FDL E studies focused on internal threats because networks
were limited in the 80s and early-90s.
• 1998 joint survey by FB I and Computer Security Institute found three years in
a row corporate’s had an increase of outsider penetration.
• 2012 Anderson conducted research to accurately measure the monetary costs
of cybercrime.
• Indirect costs may be more than direct costs.
Classification of Computer Crime
• Serves to further define the topic of study and keeps everyone on the same
page.
• Provides more opportunities to demonstrate the topic through specific and
noteworthy examples.
• Should ultimately fulfill the needs of law enforcement.
– Motivations of perpetrators
– Help in apprehension
Carter’s Classification of Computer Crimes
• Computer crimes can be classified into four categories:
– The computer as a target
– The computer as an instrument of a crime
– The computer as incidental to a crime
– Crimes associated with the prevalence of computers
The Computer as Target
• Crimes where the computer itself is the target include the denial of expected
service (Do S).
– 2016 Summer Olympics
– 2016 Trump/Hilary presidential campaign
• Examples include:
– Data alteration
– Network intrusion
– Computer vandalism (deface websites, disrupt a company's services, or
delete databases)
The Computer as Instrument
• The computer is used as the instrument of the crime when the computer is
used to gain some other criminal objective.
– Exploits trust
• Examples include:
– Theft
– Fraud
– Threats and harassment
– Bullying
The Computer as Incidental
• The computer facilitates a crime.
• Examples include:
– Money laundering
– Criminal enterprise
– Child pornography
– Luring victims
Crimes Associated with the Prevalence of
Computers
• Even those who avoid technology can be victims of crime through the
prevalence of computers.
– Intellectual property theft
– Component theft
– Counterfeiting
– Identify theft
Other Classification Schemes (1 of 3)
• Gordon and Ford two-category scheme:
– Type I offenses are primarily technological in nature and involve:
▪ A single or discreet event from the point of view of the victim
▪ Involves the use of malware
▪ Can be, but may not be, facilitated by computer software vulnerabilities
Other Classification Schemes (2 of 3)
• Gordon and Ford
– Type II offenses