IT GOVERNANCE AND CYBERCRIME Open Source Forensic Tools 19/04/10.
Cybercrime | IT Secutiry
-
Upload
granthamedu -
Category
Documents
-
view
1.154 -
download
6
Transcript of Cybercrime | IT Secutiry
CYBERCRIME: ARE YOU THE NEXT VICTIM?
CYBERCRIME: ARE YOU THE NEXT VICTIM?
Tina Freestone
Chair of the Criminal Justice Degree Program
Grantham University
Sandra J. Putnam
Assistant Special Agent in Charge
Georgia Bureau of Investigation
Cost of Cybercrime
Norton Cybercrime Report for 2011 431 adult victims globally
Losses of $388 billion (time & money loss)
14 adults become a victim every second
Most common type of cyber crime is computer viruses and malware
Cost of Cybercrime
Norton Cybercrime Report for 2011 431 adult victims globally
Losses of $388 billion (time & money loss)
14 adults become a victim every second
Most common type of cyber crime is computer viruses and malware
What is Cybercrime?
Computers being used to commit crime
Computers as the target of a crime
Computers storing evidence of a crime that has been committed
Types of Cybercrime
Child Pornography Human Trafficking Identity Theft Drugs Dealing Harassment/Threats Fraud/White Collar Crime Murder Theft
Viruses Malware Hacking Denial of Service Attacks Copyright Violations Cyber-Stalking Phishing Sexting
Traditional Crimes Technological Crimes
Challenges to Law Enforcement Computer Literate Criminals
Availability of technology for low or no cost
Technology is pushing society into the information age
Who is responsible for policing the Internet? Jurisdiction of crime
Training and Equipment costs
Evidence Integrity Physical versus Digital Evidence
How to Protect Yourself
Understand that cybercrime exist and your vulnerable
Protect your computer with the latest anti-virus and malware software
Use good passwords
Lock down all social networking sites to only be visible to “FRIENDS”
Run an annual credit report
Residential wireless router should be encrypted and password protected
AN ICAC CASE STUDY
A GBI Internet Crimes Against Children Task Force Investigation into finding the identity of 3 little girls whose images were posted on the Internet.
Investigations
Questions
Grantham University and the Criminal Justice department Thank You for attending and participating in today's Webinar.
We encourage you to follow up with any questions you may have regarding Criminal Justice or Cybercrime:
[email protected] Freestone
Grantham University and the Criminal Justice department Thank You for attending and participating in today's Webinar.
We encourage you to follow up with any questions you may have regarding Criminal Justice or Cybercrime:
[email protected] FreestoneIACP Conference Booth #4711
www.grantham.edu1.888.Y.GRANTHAM
Call to speak to a representative today.