assignment 5 1.what is internet crime? computer crime refers to any crime that involves a computer...

12
Assignment 5 1.What is Internet Crime? Computer crime refers to any crime that involves a computer and a network . [1] The computer may have been used in the commission of a crime, or it may be the target. [2] Netcrime refers to criminal exploitation of the Internet . [3] Debarati Halder and Dr. K. Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". [4] Such crimes may threaten a nation’s security and financial health. [5] Issues surrounding these types of crimes have become high-profile, particularly those surrounding cracking , copyright infringement , child pornography , and child grooming . There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. An Australian nationwide survey conducted in 2006 found that two in three convicted cyber-criminals were between the ages of 15 and 26. http://en.wikipedia.org/wiki/Computer_crime

Upload: amberlynn-matthews

Post on 29-Dec-2015

230 views

Category:

Documents


0 download

TRANSCRIPT

Assignment 5

1. What is Internet Crime?Computer crime refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target.[2] Netcrime refers to criminal exploitation of the Internet.[3] Debarati Halder and Dr. K. Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental

harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".[4] Such crimes may threaten a nation’s security

and financial health.[5] Issues surrounding these types of crimes have become high-profile, particularly those surrounding cracking, copyright infringement,

child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.An Australian nationwide survey conducted in 2006 found that two in three

convicted cyber-criminals were between the ages of 15 and 26.http://en.wikipedia.org/wiki/Computer_crime

2. What is telecommunication crime

• Telecommunications access device" means an instrument, device, card, plate, code, account number, personal identification number, electronic serial number, mobile identification number, counterfeit number, or financial transaction device that alone or with another telecommunications access device can acquire, intercept, provide, receive, use, or otherwise facilitate the use of a telecommunications device, counterfeit telecommunications device, or telecommunications service.

• http://www.statutes.legis.state.tx.us/Docs/PE/htm/PE.33A.htm

3. What are the main types of computer and telecommunication crime?

• 1. Pediphile• 2. illegal downloader• 3. hacker• 4. identity thief• 5. spammer.• http://answers.yahoo.com/question/index?

qid=1006032206649

4. What does the term "computer hacker" mean? Find a famous hacker!

• There are two types of hackers. First, you’ve got the kind that is so often portrayed by Hollywood as an anti-social nerd with a chip on his shoulder out to dominate the cyberworld by breaking into secure networks and messing things up. Second, you’ve got the kind of people who just enjoy fiddling around with software source code and hardware gigs.

• 1. Jonathan James Between August 23, 1999, and October 27, 1999, James committed a series of intrusions into various systems, including those of BellSouth and the Miami-Dade school system.[4] What brought him to the attention of federal authorities, however, was his intrusion into the computers of the Defense Threat Reduction Agency, a division of the United States Department of Defense, the primary function of which is to analyze potential threats to the United States of America, both at home and abroad. James later admitted to authorities that he had installed an unauthorized backdoor in a computer server in Dulles, Virginia, which he used to install a sniffer that allowed him to intercept over three thousand messages passing to and from DTRA employees, along with numerous usernames and passwords of other DTRA employees, including at least 10 on official military computers.[http://en.wikipedia.org/wiki/Jonathan_James

5. What are some recent news items about Internet Crime?

• Feds Seize Websites Hawking Knockoffs• (Newser) – If you've been looking for bargains online the last few days, you

may have come across a message instead from your friendly Homeland Security Department: "This website has been seized ..." The feds have been shutting down dozens of sites that appeared to be selling knockoffs of items such as NFL jerseys or designer handbags, reports TorrentFreak, which has a lengthy list of seized domains.

• Authorities also shut down torrent sites that helped people download copyrighted music, notes Business Insider. (Why a matter of homeland security? The crackdown comes from the DHS' Immigration and Customs Enforcement division, which has sway in matters of counterfeit goods and intellectual property.)

• http://www.newser.com/tag/24728/1/internet-crime.html

6. What is the RCMP doing to enforce the law regarding computer crime in Canada

• Protect Yourself!• Here are three basic precautions you should take in order to surf the Net in a more

secure manner:• 1. Make regular updates of your computer system (software, operating system,

etc.).• 2. Get a good anti-virus software and update it regularly.• 3. Get a good firewall and update it regularly.

http://www.rcmp-grc.gc.ca/qc/pub/cybercrime/cybercrime-eng.htm

7. The Criminal Code of Canada and the Copyright Act contain provisions that deal with computer and telecommunication

crime. Explain. • 1. Criminal Law Amendment Act, 1985• Criminal Code amendments dealing with computer crime came into effect on 4 December

1985. The various legislative provisions are substantially in keeping with the recommendations of the Sub-committee on Computer Crime. On the one hand, unauthorized use of a computer is proscribed by section 342.1:– Everyone who, fraudulently and without colour of right,

• (a) obtains, directly or indirectly, any computer service,• (b) by means of an electro-magnetic, acoustic, mechanical or other device, intercepts or

causes to be intercepted, directly or indirectly, any function of a computer system, or• (c) uses or causes to be used, directly or indirectly, a computer system with intent to commit

an offence under paragraph (a) or (b) or an offence under section 430 in relation to data or a computer system.

• 2. An Act to Amend the Copyright Act, S.C. 1988, c. 15• Also in keeping with the recommendations of the Sub-committee were additional steps taken to address the issue of unauthorized

appropriation of software materials. As a result of 1988 amendments to the Copyright Act, "computer program" is now defined and included in the definition of "literary works" protected under the Act. In addition to the civil remedies available for infringement of copyright, the Act makes such infringement an offence punishable on summary conviction or indictment. Additional 1988 amendments increased the penalties for that offence to a maximum of $1,000,000 and/or five years’ imprisonment for conviction on indictment.

• http://publications.gc.ca/Collection-R/LoPBdP/BP/bp87-e.htm

8. Why do people feel that this type of activity (burning CD's, hacking into other peoples computers etc.) is not a crime?

• 1. Because wanted a copy for themseleves or for friends

• 2. Another reason is they don’t know the victim or the company.

9. What are some common methods to commit computer related crime?

• Major crime is hacking. People like terrorists might try to hack government database and steal files and security information. They plan their program by using the faults they find.

Hackers are generally computer experts but they can't be Physical experts to run away from cops. The punishment is severe and they will be prosecuted to the core. If its proved that they are terrorists, they may be put to death

• Computer crimes range from the catastrophic to the merely annoying. A case of computer-driven espionage might wreak devastating losses to national security. A case of commercial computer theft might drive a company out of business. A cracker's prank might not actually cause damage at all--but might cause a video game company or another computer user some annoyance. Some computer crimes are perpetrated for kicks, and some for social or political causes; others are the serious business of professional criminals. There is perhaps no other form of crime that cuts so broadly across the types of criminals and the severity of their offenses. http://answers.yahoo.com/question/index?qid=20071005073054AAcOhAj

10. Why is it important that we become more aware of computer crime?

• So many of us now not just work online but live part of our lives online. Exchanging messages, pictures, memories through social media. Skyping or FaceTiming friends and family from thousands of miles away. Watching television or listening to radio from virtually any part of the globe. Our economy is increasingly going digital. Nearly two thirds of us manage our finances online. We do more of our shopping online than ever. Annual online retail sales topped £2.6 billion last year with year on year growth of 30%. One study suggests that the UK’s internet economy is now worth £82 billion a year and rising. And Government itself is increasingly adopting new technology for the delivery of services. Under the Digital by Default strategy, Government is moving more and more of its service provision online. It’s a global change and a global challenge.

• Over a third of the world’s population has internet access and by the end of this decade the number of networked devices could outnumber people by six to one. This digital revolution continues to offer huge opportunities for growth in our economy, our culture, our well-being. It is imperative for the future of the UK that we harness these opportunities. But if we are to benefit from the huge potential upside of the online economy we have to confront the growing digital dangers that could put this at risk. And this is one of the biggest challenges we face as a country.

• We are facing a growing and ever more complex threat. But our response to it has grown too. And our ambition is to go further. The internet should be a source of tremendous economic and cultural growth for the UK. Cyber security should be an important part of that growth.

11. What are some steps we can use to establish and maintain an adequate computer security?

• Securing your computer is essential to protecting your privacy, reducing the risk of identity theft, and preventing hackers from taking over your computer. Unfortunately, maintaining the security of your computer can be challenging. Hackers often seem to be one step ahead of even those computer users who are following the best security practices.

• Maintaining your privacy requires you to take a multi-pronged approach. It involves protecting your sensitive information by preventing, detecting, and responding to a wide variety of attacks. There are many potential risks to your computer. Some are more serious than others. Among these dangers are:

• · Viruses corrupting your entire system• · Someone breaking into your system and altering files• · A hacker using your computer to attack others• · Someone stealing your computer and accessing your personal information• There's no guarantee that even with the best precautions some of these things won't

happen. However, you can take steps to minimize the risks to your computer and your sensitive information. Ultimately, the security of your computer is dependent upon you.

• https://www.privacyrights.org/fs/fs36-securing-computer-privacy.htm

Used Wikipedia