{ "@context": "https://schema.org", "@type": "Organization", "name": "Brainscape", "url": "https://www.brainscape.com/", "logo": "https://www.brainscape.com/pks/images/cms/public-views/shared/Brainscape-logo-c4e172b280b4616f7fda.svg", "sameAs": [ "https://www.facebook.com/Brainscape", "https://x.com/brainscape", "https://www.linkedin.com/company/brainscape", "https://www.instagram.com/brainscape/", "https://www.tiktok.com/@brainscapeu", "https://www.pinterest.com/brainscape/", "https://www.youtube.com/@BrainscapeNY" ], "contactPoint": { "@type": "ContactPoint", "telephone": "(929) 334-4005", "contactType": "customer service", "availableLanguage": ["English"] }, "founder": { "@type": "Person", "name": "Andrew Cohen" }, "description": "Brainscape’s spaced repetition system is proven to DOUBLE learning results! Find, make, and study flashcards online or in our mobile app. Serious learners only.", "address": { "@type": "PostalAddress", "streetAddress": "159 W 25th St, Ste 517", "addressLocality": "New York", "addressRegion": "NY", "postalCode": "10001", "addressCountry": "USA" } }

Week 6 Flashcards

(24 cards)

1
Q

White collar crime

A

No generally agreed upon definition of white collar crime (wcc). One definition is:

“White collar crimes are illegal or unethical acts that violate fiduciary responsibility of public trust committed by an individual or organization, usually during the course of legitimate occupational activity, by persons of high or respectable social status for personal of organizational gain”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of white collar crime

A
  • Corporate crime | - Occupational crime
  • Governmental crime | - State corporate crime
  • Financial crime | - Crimes of globalisation
  • Contrepreneurial crime | - Techno-crime
  • Avocational crime
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Corporate crime (Payne, 2013)

A
  • Antitrust offences
  • Price fixing, cartels, price gouging
  • False advertising
  • Misrepresentation, bait and switch
  • Deceptive sales
  • Unfair labour practices
  • Unsafe work environments
  • Harmful consumer products
  • Harmful treatment of consumers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Implications for measuring WCC

A

Calculating the incidence of white collar crime is difficult due to:

  • The lack of compulsory and reliable data collection systems for WCC
  • WCC is not a focus of uniform crime reports (US); ABS; Police agencies; AIC
  • Reported crime and criminal court statistics will substantially under-count the incidence of WCC
    eg. because agencies may not classify it as WCC, it is mixed in with other crimes in offence categories; or outside the scope in regulatory categories
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Corporate crime research - Bartlett and Ransley

A
  • Examined the Top 3 ASX200 listed corporations in each of the 11 industry sectors, plus their wholly owned subsidiary corporations
  • Total sample = 1941 corporations (33 parent corporations and 1908 subsidiary corporations).
  • Utilised publicly available information from Australia’s four largest national regulators (ASIC, ACCC, ATO and FWA/FWO) to examine offending profiles and regulatory action over the period 1 January 2010 to 31 December 2015.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bartlett and Ransley insights

A
  • 27.2% of corporate groups (parent corporations and the subsidiaries) had at least one offence
  • In some instances offending was limited to subsidiaries
  • Total of 161 offences were identified (but a significant under-count)
  • Three corporate groups (F1, U1 and C2), or 33.3% of offending corporate groups, accounted for 76.4% of offences
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Corporate crime research insights

A
  • Offending largely fell into one of three broad categories: (1) breaches of market integrity (including cartel offences), (2) misleading or deceptive conduct (including making false and misleading representations)
    (3) unconscionable conduct.
  • > Together these three categories of offending accounted for 78.8% of identified offences
  • 8/9 offending corporate groups, (24.2% of all corporate groups studied) had engaged in conduct which was misleading or deceptive, or had made false and misleading representations.
  • 2/9 offending corporate groups had offences spanning more than one regulator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Techno crime

A

Internet crimes comes in three varieties:

  • ‘Computer focused’
  • ‘Computer enabled’
  • Online versions of ‘old offences’
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer focused crimes

A

‘Computer focused’ crimes which can only be committed due to the existence of the internet :

  • Computer hacking
  • Distribution of viruses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computer enabled crimes

A

‘Computer enabled’: crimes that use computers/internet but can be committed with or without a computer

  • Fraud
  • Theft
  • Money laundering
  • Harassment
  • Distribution of child exploitation material
  • Piracy
  • look up image
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Policing techno-crime

A

Problems with policing this type of crime:

  • crimes may not fit traditional definitions so new laws have to be passed
  • technology changes quickly & the laws may not keep up.

Problems of enforcement :

  • specialised area
  • cross jurisdictional boundaries
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Reporting and investigation of computer crime

A

Most cybercrime incidents go unreported (Center for Strategic and International Studies, 2014; AIC, 2011)

  • Victims need to recognise they have been victimised
  • Even if recognise that you’ve been victimised, may not report for a range of reasons
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why cybercrime isn’t reported

A
  • Embarrassment
  • CERT Australia Cybercrime Survey 2015 – 43% of businesses who experienced cybercrime did not report it to anyone
    60% - no benefit in reporting
    22% - offenders wouldn’t get caught/prosecuted
    22% - didn’t want negative publicity
  • Don’t know who to report too
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who to report cybercrime to

A

Internet crime may be reported to multiple agencies depending upon the nature of the offence and who is reporting, for example:

  • AFP & State/Territory Police Services (QPS Financial and Cybercrime Group)
  • CERT Australia (part of C’wlth Attorney-General’s Dept)
  • ACCC (Scamwatch)
  • ACORN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cost of internet crime

A
  • Estimated annual cost globally of internet crime is $375 billion - $575 billion (FBI, 2014)
  • Australian government estimates that cybercrime costs the nation $1.2 billion annually in direct financial losses (Symantec estimate it is closer to $2 billion)
  • Two banks in the Persian Gulf lost $45 million in a few hours
  • A British company reported that it lost $1.3 billion from a single attack
  • Brazilian banks say their customers lose millions annually to cyberfraud.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Extent of internet crime

A
  • In 2013 estimated that more than 5 million Australians had been a victims of cybercrime in the last 12 months.
  • In the US, for example, the government notified 3,000 companies in 2013 that they had been hacked
  • India’s CERT reported that 308,371 websites were hacked between 2011 and June 2013
17
Q

Businesses as victims of cybercrime

A
  • In 2016, globally, 36% of businesses reported being a victim of ‘economic crime. Of those, 32% of businesses reported being the victim of ‘cybercrime’.
  • 52% of Australian businesses have been the victim of an ‘economic crime’.
  • Of those, 65% had been the victim of cybercrime…the #1 type of economic crime committed against Australian businesses
  • 2015 ACSC Cyber Security Survey of Major Australian Businesses – 50% of respondents had experienced at least one cyber security incident in the past 12 months.
  • 5% reported more than 10 cyber security incidents.
  • look up images
18
Q

Individuals of cybercrime

A
  • “More than $234 million worth of financial loss was self-reported by victims of cybercrime to the Australian Cybercrime Online Reporting Network (ACORN) in the first quarter of 2015. If similar figures continue to be reported each period, this would equate to A$936 million over one year
  • It is important to note that this estimate would only account for losses affecting members of the public and small to medium businesses.” (ACC, 2015)
19
Q

Cybercrime offender characteristics

A
  • Cybercrime committed against Australians is assessed to be largely carried out by individuals and organised crime groups based offshore.
  • increasing awareness and access, online criminal forums and marketplaces (‘darknets’) enables Aus-based criminal actors to share info and trade illicit services and commodities internationally.
  • Cybercrime toolsets, predominantly malicious software (‘malware’), are available for purchase and ongoing service support is provided. This widens access to a previously highly technical capability to any actor with an average proficiency and a criminal intent to pursue an illicit profit”. (ACC, 2015)
20
Q

Human error

A

Survey found that 59% of respondents agree that most information security threats that result from insiders are resultant from innocent mistakes rather than malicious abuse of privileges (Federal Computer Week, 2014)

2014 IBM’s Cyber Security Intelligence Index found that 95% of security incidents involved human error – offenders preyed on human weaknesses to lure insiders to unwittingly provide access to sensitive information

21
Q

USB tests

A
  • U.S. Department of Homeland Security ran a test to see how hard it was for hackers to corrupt workers and gain access to computer systems by dropping computer discs and USB thumb drives in the parking lots of government buildings and private contractors
  • Of those who picked them up, 60% plugged the devices into office computers; if the drive or CD case had an official logo, 90% were installed
22
Q

Social engineering

A

The manipulation of people to get them to unwittingly perform actions that cause harm (or increase the probability of causing future harm) to the confidentiality, integrity, or availability of the organisation’s resources or assets, including information, information systems, or financial systems (Carnegie Mellon, 2014, pp. xi)

Used proficiently, social engineering can enable adversaries to bypass security measures they were unable to overcome via technical means. (ACSC, 2016)

23
Q

Social engineering in action

A
  • Not all social engineering attacks are designed to yield pieces of sensitive information
  • Phishing scams might be the most common types of social engineering attacks
  • Spear-Phishing: increase in sophistication of attack - limit the target audience and increase the precision of their messages; increases the appeal of the message and apparent legitimacy
24
Q

Phishing

A
  • Seek to obtain personal information, such as names, addresses, date of birth and tax file numbers
  • Use link shorteners or embed links that redirect users to suspicious websites in URLs (appear legitimate)
  • Incorporates threats, fear and/or sense of urgency to manipulate the user into acting quickly