0% found this document useful (0 votes)
35 views7 pages

Cyber Crime

The document discusses the challenges facing law enforcement with the rise of cyber crime. It notes that there are more cyber criminals than cyber cops, and criminals can commit crimes anonymously from their own homes. This creates brand new challenges for law enforcement who have limited training and experience with technologies, and crimes that span multiple jurisdictions. The document also provides an overview of computer forensics and how digital evidence must be handled carefully and preserved to hold up in court. It lists some common computer crimes and tips for protecting computers and digital evidence.

Uploaded by

Navdeep Saboo
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views7 pages

Cyber Crime

The document discusses the challenges facing law enforcement with the rise of cyber crime. It notes that there are more cyber criminals than cyber cops, and criminals can commit crimes anonymously from their own homes. This creates brand new challenges for law enforcement who have limited training and experience with technologies, and crimes that span multiple jurisdictions. The document also provides an overview of computer forensics and how digital evidence must be handled carefully and preserved to hold up in court. It lists some common computer crimes and tips for protecting computers and digital evidence.

Uploaded by

Navdeep Saboo
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 7

Cyber Crime Is the Internet the new Wild W Wild West?

Ashish Saboo 9A9A-1 Roll no. 9153

The New Wild Wild West


More cyber criminals than cyber cops Criminals feel safe committing crimes from the privacy of their own homes Brand new challenges facing law enforcement


Most not trained in the technologies Internet crimes span multiple jurisdictions Need to retrofit new crimes to existing laws

Computer Crime
Computer used to commit a crime


Child porn, threatening email, assuming someones identity, sexual harassment, defamation, spam, phishing

Computer as a target of a crime




Viruses, worms, industrial espionage, software piracy, hacking

Computer Forensics
What is it?
 

an autopsy of a computer or network to uncover digital evidence of a crime Evidence must be preserved and hold up in a court of law

Growing field Many becoming computer forensic savvy




  

FBI, State and Local Police, IRS, Homeland Security Defense attorneys, judges and prosecutors Independent security agencies White hat or Ethical Hackers Programs offered at major universities such as URI
http://homepage.cs.uri.edu/faculty/wolfe/cf

Uncovering Digital Evidence


Smart Criminals dont use their own computers Floppy disks Zip/Jazz disks Tapes Digital cameras Memory sticks Printers CDs PDAs Game boxes Networks Hard drives

The Crime Scene


(with Computer Forensics)
Similar to traditional crime scenes


Must acquire the evidence while preserving the integrity of the evidence
No damage during collection, transportation, or storage Document everything Collect everything the first time

Establish a chain of custody

But also different.




Can perform analysis of evidence on exact copy! Make many copies and investigate them without touching original Can use time stamping/hash code techniques to prove evidence hasnt been compromised

Protect your Computers!


Use anti-virus software and antifirewalls - keep them up to date Keep your operating system up to date with critical security updates and patches Don't open emails or attachments from unknown sources Use hard-to-guess passwords. hard-toDont use words found in a dictionary. Remember that password cracking tools exist BackBack-up your computer data on disks or CDs often Don't share access to your computers with strangers password protect it

If you have a wi-fi network, wiDisconnect from the Internet when not in use Reevaluate your security on a regular basis Make sure your employees and family members know this info too!

You might also like