Download
computer forensics and crime n.
Skip this Video
Loading SlideShow in 5 Seconds..
Computer Forensics and Crime PowerPoint Presentation
Download Presentation
Computer Forensics and Crime

Computer Forensics and Crime

167 Views Download Presentation
Download Presentation

Computer Forensics and Crime

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Computer Forensics and Crime Group 17 Lewis Hagen

  2. Overview Computer Crime • Cybercrime • Types • How to Protect Yourself Computer Forensics • Business Study • Discussion

  3. Computer Crime • Criminal activity where a computer or network is the source, tool, target, or place of a crime. • 2005 – Est. $10B in losses • A majority of computer crime goes unnoticed and is not reported. • Scale

  4. Type of Computer Crimes • Malware/Malicious Code • Computer Virus • Unauthorized access to or modification of programs • Identity theft

  5. Malware • Software designed to infiltrate or damage a computer system without the owner's informed consent. • It includes computer viruses, worms, trojan horses, spyware, dishonest adware, and other malicious and unwanted software.

  6. Unauthorized access to or modification of programs • Hacker • someone involved in computer security/insecurity, specializing in the discovery of exploits in systems (for exploitation or prevention), or in obtaining or preventing unauthorized access to systems through skills, tactics and detailed knowledge

  7. Identity Theft • Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. • Video

  8. How to Protect Yourself • Anti-Virus Software • Norman Virus Control • Norton AntiVirus • McAfee VirusScan Do not open Do not open Suspicious Email ID Protection LifeLock

  9. Computer Forensics • Computer forensics: also called cyberforensics, is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law.

  10. Computer Forensics Steps • Identify sources of digital evidence • Preserve the evidence • Analyze the evidence • Present the findings When would It be used? • Employee internet abuse • Criminal fraud • Identity theft • Unauthorized disclosure of corporate information

  11. Business Study • Disklabs • Global Company Established in 1997 • 'No matter what the computer crime, there will always be incriminating evidence.Computer Forensics will find it.' • Video

  12. What Do you Think? • Do you think Your personal Information Is Safe? • Is It an invasion of your personal rights to have your Computer torn apart?

  13. Where Did I find My information? • Wikipedia • Google • Information Week • Business Week • Disklabs Website • YouTube

  14. Sources • I tried to use current sources when available • Reading #1- Computer Crime followed by **Cybercrime**,,3 March 2008. Reading #2- Searching and Seizing ComputersJuly 2002. Reading #3-FBI Computer Crime Survey18 January 2006 Reading # 4**Internet Crime Prevention Tips** Reading # 5- **An Explanation of Computer Forensics**

  15. Sources I didn’t Use • These Articles were not Outdated and offered only a single narrow opinion. • www.computer-forensic.com/old_site/presentations/ASIS_Presentation.pdf • www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9047900&pageNumber=1

  16. Computer Forensics and Crime • Questions??