Chapter 1 Flashcards
(26 cards)
Cyber crimes
Inspire fear in consumers and lead to lack of trust and security in e-commerce
Traditional criminal acts performed on computers
Child porn
Financial crimes
Corporate espionage
Exploitation
Stalking
Identity theft
Cyber
“Real” or “virtual” attached to a computer network
Malware
Short for malicious software
Referred to as computer contaminant
Viruses, worms, Trojan horses, spyware, adware, other destructive software
Major complications of cyber crime
- Increased dramatically in recent years
- Significant inconsistency in defining computer crime offenses
- No systematic data collection procedures for cyber crime
- Offenses vary greatly in character
Developmental perspective
- much has changed since computers first introduced, few experts explored potential to use computers to commit crimes
- most research focusses on mechanic techniques of computer crimes and not offenders and offenses
Pioneer in early computer crime research
Donn Parker
Popular publications of cyber crime
The Cuckoo’s Egg, Takedown
Two trends that drive increase of cybervictimization
- Increase use of computers
2. Increased availability of technical info on virus creation and hacking techniques
Greatest threat?
Insiders
Outsiders is growing problem
National Infastructure Protection Center (NIPC)
Infers cyber crime and cyber terrorism are in same track (parallel)
Costs of cyber crime
- derived from surveys of corporations and agencies
- difficult to accurately calculate
- companies often underreport
1988 joint survey by FBI and Computer Security Institute
3 years in a row corporations had increased outsider penetration
Classification of computer (cyber) crime
- further defines topic, keeps everyone same page
- provides more opportunities to demonstrate topic through specific and noteworthy examples
- should fulfill needs of law enforcement with motives and apprehension
Carters classification of computer crime:
Computer as a target
Computer itself is target- include denial of expected service (DoS)
-2016 summer Olympics, Trump/Hillary
Ex) data alteration, network intrusion, computer vandalism
Carters classification of computer crime:
Computer as instrument of crime
Computer is used to gain criminal objective
-exploits trust
Ex) theft, fraud, threats, harassment, bullying
Carters classification of computer crime:
Computer is incidental to crime
Computer facilitates crime
Ex) money laundering, criminal enterprise, child porn, luring victims
Carters classification of computer crime:
Crimes associated with prevalence of computers
Even those who avoid technology can be victims
Ex) intellectual property theft, counterfeiting, identity theft
Gordon and Ford classification of computer crime:
Type 1 offenses
Primarily technological in nature
Involves:
- single and discreet event from POV of victim
- uses malware
- can be, but mostly may not be, facilitated by computer software vulnerabilities
Gordon and Ford classification of computer crime:
Type 2 offenses
Do not involve malware
Generally involves repeated contacts or events from POV of victim
Does not usually involve use of software
Ex) cyberstalking, harassment, child porn, extortion
Anderson classification of cyber crime (2012)
- primarily to derive estimate of cost
- traditional crimes that are now considered cyber
- transitional crimes have changed with advent of internet
- new crimes have originated since internet
- crimes that facilitate other crimes through misuse of computers
of internet connected devices
Estimated over 87 billion
Internet experiences explosive growth in
1995
Industrialization
Has a connection to increased commercial activity