Top Banner
CYBERCRIME: ARE YOU THE NEXT VICTIM?
15
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cybercrime | IT Secutiry

CYBERCRIME: ARE YOU THE NEXT VICTIM?

Page 2: Cybercrime | IT Secutiry

CYBERCRIME: ARE YOU THE NEXT VICTIM?

Tina Freestone

Chair of the Criminal Justice Degree Program

Grantham University

Sandra J. Putnam

Assistant Special Agent in Charge

Georgia Bureau of Investigation

Page 3: Cybercrime | IT Secutiry

Cost of Cybercrime

Norton Cybercrime Report for 2011 431 adult victims globally

Losses of $388 billion (time & money loss)

14 adults become a victim every second

Most common type of cyber crime is computer viruses and malware

Page 4: Cybercrime | IT Secutiry
Page 5: Cybercrime | IT Secutiry

Cost of Cybercrime

Norton Cybercrime Report for 2011 431 adult victims globally

Losses of $388 billion (time & money loss)

14 adults become a victim every second

Most common type of cyber crime is computer viruses and malware

Page 6: Cybercrime | IT Secutiry

What is Cybercrime?

Computers being used to commit crime

Computers as the target of a crime

Computers storing evidence of a crime that has been committed

Page 7: Cybercrime | IT Secutiry

Types of Cybercrime

Child Pornography Human Trafficking Identity Theft Drugs Dealing Harassment/Threats Fraud/White Collar Crime Murder Theft

Viruses Malware Hacking Denial of Service Attacks Copyright Violations Cyber-Stalking Phishing Sexting

Traditional Crimes Technological Crimes

Page 8: Cybercrime | IT Secutiry

Challenges to Law Enforcement Computer Literate Criminals

Availability of technology for low or no cost

Technology is pushing society into the information age

Who is responsible for policing the Internet? Jurisdiction of crime

Training and Equipment costs

Evidence Integrity Physical versus Digital Evidence

Page 9: Cybercrime | IT Secutiry

How to Protect Yourself

Understand that cybercrime exist and your vulnerable

Protect your computer with the latest anti-virus and malware software

Use good passwords

Lock down all social networking sites to only be visible to “FRIENDS”

Run an annual credit report

Residential wireless router should be encrypted and password protected

Page 10: Cybercrime | IT Secutiry

AN ICAC CASE STUDY

A GBI Internet Crimes Against Children Task Force Investigation into finding the identity of 3 little girls whose images were posted on the Internet.

Page 11: Cybercrime | IT Secutiry

Investigations

Page 12: Cybercrime | IT Secutiry

Questions

Page 13: Cybercrime | IT Secutiry

Grantham University and the Criminal Justice department Thank You for attending and participating in today's Webinar.

We encourage you to follow up with any questions you may have regarding Criminal Justice or Cybercrime:

[email protected] Freestone

Page 14: Cybercrime | IT Secutiry

Grantham University and the Criminal Justice department Thank You for attending and participating in today's Webinar.

We encourage you to follow up with any questions you may have regarding Criminal Justice or Cybercrime:

[email protected] FreestoneIACP Conference Booth #4711

Page 15: Cybercrime | IT Secutiry

www.grantham.edu1.888.Y.GRANTHAM

Call to speak to a representative today.