CYBR CRIM

Embed Size (px)

DESCRIPTION

cyber crim project

Citation preview

Review Of Literature:Cybercrime is an escalating information technology concern in the 21st century, and this three-volume reference work provides broad coverage of the subject, along with details about specific technologies and issues. Divided into eight topical sections ranging from fundamental concepts and current tools to organizational, social, and managerial impacts to emerging trends, the 102 chapters are all written by academic experts. Technical illustrations augment the chapters, which frequently include a glossary of key terms along with recommended reading thus supporting the research needs of both undergraduate and graduate students.Changes in technology have resulted in corresponding changes in white-collar crime in the United States during the past two decades years. Computer crime was rare twenty years ago, primarily because there were fewer computers. Personal computers were not invented, mid-range computers were becoming more affordable and popular. Computer technology, performance and capacity have changed drastically. Computers are becoming more accessible. With the advent of less expensive personal computers and the popularity of using telecommunications to access other computers via high-speed modems, society is faced with the challenge of computer crime and abuse. This literature review focuses on computer security, crime and abuse. The area of IBM AS/400 security is of special interest.

Abstract: Cyber law enforcement effectiveness is one of the instruments that can be used to evaluate the effect and performance of the initial goals and objective from UU ITE implementation. The question might arise regarding the effectiveness of UU ITE 11/2008 after being signed by legislative. Do the existing control sufficient to limit any possibility of damages to occur? And what kind of strategies has been performed to support the cyber law enforcement. Understanding the implication of the cyber law enforcement in the cyber communities will depict how well the strategy has accomplished.

Research Cyber SecurityCyber security is a research area that crosses multiple research areas, including Information Security, in particular for critical systems and end-users, or Identity & Privacy, where the strong identification provides a trust root and privacy the safeguards for citizens. Our cyber security research focuses mostly on combating cybercrime and protecting the social fabric. Cybercrime is a composition of crime and cyberspace.CrimeThe crime component implies the presence of a perpetrator, an adversary whose actions are harmful or costly for society. Crime also implies the involvement of a physical entity, for instance the victim or the capitalization in physical money, which implies in turn that there is no cybercrime entirely in cyberspace, in which we follow the defenition of Benenson et al. [Benenson2011]. There are always human beings that act or are acted upon, which raises the question of human factors in security.CyberspaceThe cyberspace component implies that there is a cyber element present, where the most likely case may be hurt done by cyber means. Cyberspace may be the medium for the crime or be used by the perpetrator to gain more scalability. Newman [Newman2009] categorizes the role of cyberspace into tool, target or place for the crime.Research AreasIn Newcastle, we research security against cybercrime, organized in the CCCS, along four themes: Understanding cyber adversaries and their attack vectors. Protecting critical infrastructures, such as the cloud or the identity infrastructure, and increasing the dependability and security of systems. Supporting investigators, Protecting victims, for instance with privacy tools.The Role of Human FactorsHuman decision making impacts cyber security, this is part of the research hypothesis of the Cyber Security Research Institute on Choice Architecture for Information Security. We believe that human users, e.g., victims in a cybercrime, are affected by decision biases, even if they are supported by rigorous decision making methods. Our work aims at integrating human factors in cyber security work.

HYPOTHESIS:begin by eliminating the obvious. There will be a lot of chaos around a crime scene and try to focus on meaningful information immediately. Also, many observers will have theories which can serve to confuse the important issues, making your job as an investigator much more difficult. A piece of eliminating the obvious is to ensure that nothing can happen to pollute the crime scene. It is at this point you need to take steps to secure the crime scene so that you can gather evidence and preserve it correctly. next step is to begin the process of hypothesizing how the attack took place. Use preliminary information gathered to develop an early theory of what happened and how it occurred. Its too early, in most cases, to start thinking about a culprit at this point. Begin with process of evidence collection. proceed as carefully as possible. As the evidence collect should help refine the intrusion hypothesis. It will also lead to alternative explanations, which must analyze as well.Begin your incident analysis by attempting to reconstruct the crime. The field of computer incident investigation is one of the few today where we can reconstruct the crime.Incident analysis has three major objectives:1. Refining your hypothesis2. Examining alternative explanations3. Generating additional leads for further investigationNext, perform any tracebacks that our analysis suggests. Tracebacks, are very difficult and time-consuming. Dont even attempt a traceback unless the intruder is online, or you have preserved your evidence and can proceed safely to trace the intruder without damaging evidence. Remember, when you obtain assistance from intermediate sites (those between the victim and the original source of the attack), you must take steps to ensure that the evidence you collect from them will stand up to scrutiny. The final phase is performing a detailed analysis of the source, intermediate, and victim computers. Perform analysis on images of these computers. Our objective is to collect more evidence.Evidence analysis and report preparation. This is where you will collect all of your findings and evidence, refine and document your hypothesis, and present the whole package to your management, client, or, perhaps, law enforcement. This is very important because your audience is likely to try to shoot down your conclusions. Neither your management or law enforcement wants to proceed with an investigation, litigation, and/or prosecution based upon a weak conclusions unsupported by strong evidence.

QUESTIONNAIREHowever, some common questions include:1. Have you ever gotten an e-mail that you were certain of being spam?2. If yes, what did you do about the spam e-mail?3. Have you met any person whom you encountered only in a chat room?4. Has your identity ever been stolen? Or, do you know anyone who has suffered from identity theft online?5. Has your PC ever been infected by a computer virus that damaged your PC components or stored data considerably?6. Have you ever received any e-mail that advertised child pornography?7. Do you feel like your PC has ever been hacked?8. Have you ever had any problem with any online merchant account?9. Do you feel like there is any other type of cybercrime that has not been covered in this questionnaire?10. Do you feel like you are well protected against cybercrimes?11. Are you male or female?Are you male or female? MaleFemale

12. Age:12. 13. Age:14. *15. How often do you use the Internet?How often do you use the Internet? EverydayTwo to three days a weekOnce a weekTwice a monthOnce a monthNever

16. 16. Are you aware of the RA 10175 also called as "The Cybercrime Prevention Act of 2012"?Are you aware of the RA 10175 also called as "The Cybercrime Prevention Act of 2012"? YesNo

17. Have you read the RA 10175 "The Cybercrime Prevention Act of 2012"?Have you read the RA 10175 "The Cybercrime Prevention Act of 2012"? YesNo

18. Did you understand the full context and objectives of the RA 10175 "The Cybercrime Prevention Act of 2012"?Did you understand the full context and objectives of the RA 10175 "The Cybercrime Prevention Act of 2012"? YesNoKind of

19. Are you for or against the law?Are you for or against the law? For the lawAgainst the law

20. *21. 8. Is there something you wish to change with the law?Is there something you wish to change with the law? YesNo

22. *23. 9. If yes, do you wish to change some provisions of the said law?If yes, do you wish to change some provisions of the said law? YesNo

24. *25. 10. If yes, what parts do you particularly want to change or to amend?If yes, what parts do you particularly want to change or to amend? Libel ClausePenaltiesBoth

Other (please specify)

SummaryIn this paper, the three main categories of cybercrime are introduced.: (1) target cybercrime: crimes in which a computer is the target of the offense. In this category, three main target cybercrimes are presented, including hacking, malware and DDoS attack. Actually, target cybercrime is the most professional crime on cyberspace. The defense of target cybercrime always has time lag, since we always take actions to patch an exploit after a novel method is revealed. In other words, the active defense is difficult. (2) tool cybercrime: crime in which a computer is used as a tool in committing the offense. In this category, crime against property, including theft, fraud and extortion, and crime against persons, including physical harm and psychological harm are examined. (3) computer incidental: crimes in which a computer plays a minor role in committing the offense. In this category, the challenges for collecting the evidence are presented, which include evidentiary challenge and digital privacy. In all, cybercrime is a new type of crime, compared with traditional crimes, but the harm caused by the former is not less than the latter. Thus, we hope people obtain a general concept of cybercrime so that protect our cyber-security better from now.

ConclusionCyber crime and digital crime is increasing rapidly. Is difficult for law enforcement to battle and helping the professions to treat both the victims and the offenders. Hoping that in near +future the government will come out with some rules and law to combat these cyber threat. Train more forensics specialist and getting other countries onboard would also increase the security. Promote cyber security globally and helping other nations become more cyber secure.