Top Banner
Chapter One Copyright © 2010, Thomas J. Holt, All Rights Reserved
10
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chapter One Copyright © 2010, Thomas J. Holt, All Rights Reserved.

Chapter One

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Page 2: Chapter One Copyright © 2010, Thomas J. Holt, All Rights Reserved.

Defining and Measuring CybercrimeHow does modern society cope with the

threats caused by the ubiquity of technology? Internet access and technology have affected

all aspects of modern lifeCommunicationsFinance and businessMedicine Private entities

This has benefits but also results in costs

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Page 3: Chapter One Copyright © 2010, Thomas J. Holt, All Rights Reserved.

Costs of growth of technologyGrowth has spawned a range of deviant and

criminal behaviorsPose unique challenges to law enforcement

and legal systemMassive numbers of victims with little effortAttacks against nations/states Little time or money invested Allows for a significant degree of anonymity

Significant threat creates a strong need to identify and understand online criminality

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Page 4: Chapter One Copyright © 2010, Thomas J. Holt, All Rights Reserved.

Defining and Measuring Cybercrime Cybercrime

Perpetrator uses special knowledge of cyberspace

Computer crimePerpetrator uses special knowledge about

computer technologyVarious definitions

Among government agenciesNational agencies

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Page 5: Chapter One Copyright © 2010, Thomas J. Holt, All Rights Reserved.

Global Cyber Law SurveyConsensus crimes include

Unauthorized accessComputer-mediated espionagePrivacy violationsDamage or theft of computer hardwareIllicit tampering of data or filesComputer or network sabotage Use of information systems to commit fraud,

forgery, and “traditional crimes”

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Page 6: Chapter One Copyright © 2010, Thomas J. Holt, All Rights Reserved.

Definitional and Measurement IssuesCountries can agree on what behaviors

constitutes cybercrimeFew nations define what cybercrime is

Affected by industrialization level Significant undercounting of these crimes

Crimes go unreported Confusion over how or where to file reports

Barriers to research Lack of statistical measures, quality data

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Page 7: Chapter One Copyright © 2010, Thomas J. Holt, All Rights Reserved.

Cybercrime FrameworkCyber-trespassCyber-deception/TheftCyber-porn/ObscenityCyber-violence

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Page 8: Chapter One Copyright © 2010, Thomas J. Holt, All Rights Reserved.

Cyber-trespass Crossing of invisible yet salient boundaries of

ownership on-lineMost notable example of cyber trespass

criminals are computer hackersHackers are individuals with desire to

penetrate systems they do not own

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Page 9: Chapter One Copyright © 2010, Thomas J. Holt, All Rights Reserved.

Cyber-trespass: Hackers Individuals with a profound interest in

computers and technology that have used their knowledge to access computer systems

Malicious or ethical purpose alike More hackers are tied to criminal breaches of

networksAlso responsible for malicious software

programs or malware

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Page 10: Chapter One Copyright © 2010, Thomas J. Holt, All Rights Reserved.

Computer MalwareComputer viruses, worms, Trojan horse programsAlter functions within computer programs and

filesDisrupt email and network operationsAccess private filesDelete or corrupt computer software or hardware

Enable identity theft, fraud and loss of personal information

Pose significant threat to users around globeSignificant costs and losses

Copyright © 2010, Thomas J. Holt, All Rights Reserved