Cybercrime | IT Secutiry

Post on 10-May-2015

1.164 views 6 download

Tags:

Transcript of Cybercrime | IT Secutiry

CYBERCRIME: ARE YOU THE NEXT VICTIM?

CYBERCRIME: ARE YOU THE NEXT VICTIM?

Tina Freestone

Chair of the Criminal Justice Degree Program

Grantham University

Sandra J. Putnam

Assistant Special Agent in Charge

Georgia Bureau of Investigation

Cost of Cybercrime

Norton Cybercrime Report for 2011 431 adult victims globally

Losses of $388 billion (time & money loss)

14 adults become a victim every second

Most common type of cyber crime is computer viruses and malware

Cost of Cybercrime

Norton Cybercrime Report for 2011 431 adult victims globally

Losses of $388 billion (time & money loss)

14 adults become a victim every second

Most common type of cyber crime is computer viruses and malware

What is Cybercrime?

Computers being used to commit crime

Computers as the target of a crime

Computers storing evidence of a crime that has been committed

Types of Cybercrime

Child Pornography Human Trafficking Identity Theft Drugs Dealing Harassment/Threats Fraud/White Collar Crime Murder Theft

Viruses Malware Hacking Denial of Service Attacks Copyright Violations Cyber-Stalking Phishing Sexting

Traditional Crimes Technological Crimes

Challenges to Law Enforcement Computer Literate Criminals

Availability of technology for low or no cost

Technology is pushing society into the information age

Who is responsible for policing the Internet? Jurisdiction of crime

Training and Equipment costs

Evidence Integrity Physical versus Digital Evidence

How to Protect Yourself

Understand that cybercrime exist and your vulnerable

Protect your computer with the latest anti-virus and malware software

Use good passwords

Lock down all social networking sites to only be visible to “FRIENDS”

Run an annual credit report

Residential wireless router should be encrypted and password protected

AN ICAC CASE STUDY

A GBI Internet Crimes Against Children Task Force Investigation into finding the identity of 3 little girls whose images were posted on the Internet.

Investigations

Questions

Grantham University and the Criminal Justice department Thank You for attending and participating in today's Webinar.

We encourage you to follow up with any questions you may have regarding Criminal Justice or Cybercrime:

tfreestone@grantham.eduTina Freestone

Grantham University and the Criminal Justice department Thank You for attending and participating in today's Webinar.

We encourage you to follow up with any questions you may have regarding Criminal Justice or Cybercrime:

tfreestone@grantham.eduTina FreestoneIACP Conference Booth #4711

www.grantham.edu1.888.Y.GRANTHAM

Call to speak to a representative today.