cyber crimes & cyber war
TRANSCRIPT
-
8/4/2019 Cyber Crimes & Cyber War
1/27
Cyber Crimes & Cyber
war
-
8/4/2019 Cyber Crimes & Cyber War
2/27
Cyber Crimes
Any criminal activity that uses a computereither as an instrumentality, target or ameans for perpetuating further crimescomes within the ambit of cyber crime
-
8/4/2019 Cyber Crimes & Cyber War
3/27
Another Definition
It is a criminal activity committed on theinternet. This is a broad term that describeseverything from electronic cracking to denialof service attacks that cause electronic
commerce sites to lose money.
-
8/4/2019 Cyber Crimes & Cyber War
4/27
What is Cyber Crime?
Crimes where a computer is the target of the
crime,
Crimes where a computer is a tool of the
crime, and
Crimes where a computer is incidental to the
commission of the crime.
-
8/4/2019 Cyber Crimes & Cyber War
5/27
Characteristics of Cyber Crime
Silent in NatureGlobal in character
Non existence of Physical Evidence
Creates high Impact
High Potential and Easy to Perpetrate
-
8/4/2019 Cyber Crimes & Cyber War
6/27
Categories of Cyber Crimes
Cyber crimes against persons.
Cyber crimes against property.
Cyber crimes against government.
-
8/4/2019 Cyber Crimes & Cyber War
7/27
CYBER CRIMES ARE
NEITHER FORWARD..NOR BACKWARD..
BUT AWKWARD:
-
8/4/2019 Cyber Crimes & Cyber War
8/27
Cybercrimes against persons
Cybercrimes committed against personsinclude various crimes
Transmission of pornography Harassment of any one The trafficking, distribution, posting, and
dissemination of X-rated material Threats to some ones privacy
-
8/4/2019 Cyber Crimes & Cyber War
9/27
Cybercrimes against property
The second category of Cyber-crimes is thatof Cybercrimes against all forms of property.
These crimes include computer vandalism(destruction of others' property),transmission of harmful programs.
Threats to hardware and data
-
8/4/2019 Cyber Crimes & Cyber War
10/27
Cybercrimes againstgovernment
Cyber terrorism Attack on Govt. web sites
Attack on Military web sites Cyberspace individuals and groups to threaten the
international governments "cracks" into a government or military
maintained website.
-
8/4/2019 Cyber Crimes & Cyber War
11/27
2000 2001 2002 2003 20040
2
4
6
8
10
12
CYBERCRIME GRAPH
-
8/4/2019 Cyber Crimes & Cyber War
12/27
Cyber War
Defination
actions by a nation-state to penetrateanother nation's computers or
networks for the purposes of causing
damage or disruption.
-
8/4/2019 Cyber Crimes & Cyber War
13/27
Cyber War
Pentagon has formally recognizedcyberspace as a new domain in warfare
critical to military operations as land, sea,air, and space.
China has plans of winning informationised
wars by the mid-21st century
-
8/4/2019 Cyber Crimes & Cyber War
14/27
Countries at the top
countries are likewise organizing for cyberwar, among them are Russia, Israel and
North Korea
Iran claims of having the worlds second-largest cyber-army.
U.S. has a severe shortage of computersecurity specialists
-
8/4/2019 Cyber Crimes & Cyber War
15/27
only about 1,000 qualified people in thecountry
but needs a force of 20,000 to 30,000skilled experts
Pakistan ????
-
8/4/2019 Cyber Crimes & Cyber War
16/27
CYBER FORENSICS &TECHNOLOGY
CYBER FORENSICSCAN BE AN EFFECTIVE TOOL
-
8/4/2019 Cyber Crimes & Cyber War
17/27
CYBER FORENSICS IS
The unique process of identifying,preserving, analyzing and presentingdigital evidence in a manner that islegally accepted.
-
8/4/2019 Cyber Crimes & Cyber War
18/27
MULTI DIMENSIONALCHALLENGE
TECHNICAL
OPERATIONALSOCIAL
LEGAL
-
8/4/2019 Cyber Crimes & Cyber War
19/27
TECHNICAL
TECHNOLOGY IS CHANGING RAPIDLY
CYBER CRIMES ARE ALSO CHANGINGRAPIDLY
SYSTEMS AND CRIMES EVOLVE MORERAPIDLY THAN THE TOOLS THAT EXAMINE
THEM
-
8/4/2019 Cyber Crimes & Cyber War
20/27
TECHNOLOGY
EVOLUTION
OBSOLESENCE
NEWERDEVICES
NEWTOOLS
NEWMETHODOLOGIES
-
8/4/2019 Cyber Crimes & Cyber War
21/27
OPERATIONAL
ALL DATA MUST BE GATHERED AND EXAMINEDFOR EVIDENCE
GIGABYTES OF DATA PROBLEMS OF
STORAGE ANALYSIS PRESENTATION..
NO STANDARD SOLUTION AS YET
-
8/4/2019 Cyber Crimes & Cyber War
22/27
SOCIAL
IT RESULTS IN
UNCERTAINITIES ABOUT EFFECTIVENESSOF CURRENT INVESTIGATION TECHNIQUES
SUB OPTIMAL USE OF RESOURCES
PRIVACY CONCERNS
-
8/4/2019 Cyber Crimes & Cyber War
23/27
LEGAL
USE & BOUNDS OF DIGITAL EVIDENCE INLEGAL PROCEDURES STILL UNCLEAR
CURRENT TOOLS & TECHNIQUES NOTRIGOROUSLY USED / CONTESTED INCOURT
-
8/4/2019 Cyber Crimes & Cyber War
24/27
-
8/4/2019 Cyber Crimes & Cyber War
25/27
PROTECT YOUR COMPUTERS!
Use anti-virus software and firewalls - keep them up tofirewalls - keep them up to date
Keep your operating system up to date with criticalsecurity updates and patches
Don't open emails or attachments from unknown source
Don't share access to your computers with strangers
If you have a Wi-Fi network, password protect it
Disconnect from the Internet when not in use
-
8/4/2019 Cyber Crimes & Cyber War
26/27
"The modern thief can stealmore with a computer than
with a gun. Tomorrow'sterrorist may be able to domore damage with a keyboardthan with a bomb".
National Research Council
-
8/4/2019 Cyber Crimes & Cyber War
27/27
Questions??
Click to edit Master text stylesSecond level Third level Fourth level Fifth level