Vous êtes sur la page 1sur 14

Introduction to the Module,

Cyber Crime, and Cyber


Security

Lecture 1

Presenter: Dr. Jianming Cai


j.cai@londonmet.ac.uk

CC7177 Cyber Crime and Cyber Security


Module Syllabus
• Introduction to the module and cyber security
• Background to the development, evolution and challenges
of, and legislative context for digital and cybercrimes
• Various types of current and emerging online cyber-
attacks, threats and criminal acts, including related digital
crimes.
• Technical measures, controls and applications in areas of
applied cryptography, steganography, network intrusion,
authentication, authorisation, including new technological
developments.
• The economic, legal, social, ethical and professional
impact of cybercrime and cyber security within the national
and global context.
CC7177 Cyber Crime and Cyber Security
Module Weekly Teaching Plan
Week Topic Ref.

Introduction to the module, cyber crime, and cyber Chp. 1 - Thomas


1
security J. Holt, etl.

Challenges of cyber crime and legislative context for Chp. 1&2 -


2
digital and cybercrimes Robin, B.

Chp. 2 - Thomas
3 Computer hackers and hacking
J. Holt, etl.

Chp. 4 - Chuck
4 Denial of service attacks
Eastton

Chp. 3 - Thomas
5 Malware and automated computer attacks
J. Holt, etl.

Chp. 6 - Chuck
6 Techniques used by hackers
Eastton

Chp. 9 - Chuck
7 Security technology
Eastton

Chp. 11 - Chuck
8 Network scanning and vulnerability scanning
Eastton

Chp. 13 - Chuck
9 Cyber detective
Eastton

Chp. 10 -
10 Digital forensics Thomas J. Holt,
etl.

11 Revision

CC7177 Cyber Crime and Cyber Security


Key Reference Books
1. Computer Security Fundamental, 3/E, Chuck
Eastton, ISBN-13: 978-0-7897-5746-3, © 2016,
Pearson
2. Cybercrime and Digital Forensics, An Introduction,
Thomas J. Holt, Adam M. Bossler, and Kathryn C.
Seigfried-Spellar, ISBN: 978-1-138-02129-7
(hbk)/ISBN: 978-1-138-02130-3 (pbk)/ISBN: 978-1-
315-77787-0 (ebk), 2015, Routledge
3. Robin, B., (2008) Investigating Digital Crime. Wiley

CC7177 Cyber Crime and Cyber Security


The Digital Divide
• Computers and mobile devices are now
ubiquitous.
– The availability of Computer-Mediated
Communications (CMC), like e-mail, text, Facebook,
etc. has changed the world.
• This is a recent innovation, causing a
generational divide.
– Digital Natives.
– Digital Immigrants.

CC7177 Cyber Crime and Cyber Security


Technology as a
Landscape for Crime
• There are three key ways that technology may
be subverted or misused by criminals:
– technology as a communications medium
– computer as a target of or means to engage in crime
– technology as an incidental device to a crime.

CC7177 Cyber Crime and Cyber Security


Technology as Communications
Medium
• CMCs make it easy for offenders to connect with
one another.
– Prostitutes and customers connect via e-mail or text.
– Hackers connect via forums.

• The ability to connect in on-line environments


has enabled the formation of virtual subcultures.
– Subcultures are groups which have their own values,
norms, and traditions that set them apart from and/or
in opposition to the dominant culture.

CC7177 Cyber Crime and Cyber Security


Technology as a Target
• The computers and mobile devices we use
every day can be targeted by offenders to cause
harm to information or people.
– Computer hackers attempt to gain access to systems
they do not own.
• Password guessing.
• Web defacement.
– Malicious software can harm computers and personal
information.

CC7177 Cyber Crime and Cyber Security


Technology as Evidence
• The devices we use produce digital evidence of
our activities:
– information that is either stored or transferred in
binary form
– photos, chat logs, e-mails, browser histories, etc.

• Digital evidence can be used to support


criminal investigations of virtually any offense,
on- or off-line.

CC7177 Cyber Crime and Cyber Security


Defining Computer Misuse
• There are several key terms to define abuse
and misuse of technology.
– Cyberdeviance is behaviors that may not be illegal
but go against local norms or values.
– Cybercrimes occur when a perpetrator uses special
knowledge of cyberspace to commit a crime.
– Cyberterror involves the use of digital technology or
CMCs to cause harm and force social change based
on ideological or political beliefs.

CC7177 Cyber Crime and Cyber Security


Why Is Cybercrime Attractive?
• There are several reasons why individuals may choose to
engage in cybercrimes relative to real world offenses.
– Individuals can easily gain access to technology and Internet
access in virtually any corner of the globe.
– Cybercrimes can be performed regardless of any technical
skill.
– Offenders can target millions of victims at once.
– The risk of detection is greatly reduced.
– Law enforcement agencies have trouble prosecuting these
crimes, especially in transnational cases.
– Many victims may not report their experiences.

CC7177 Cyber Crime and Cyber Security


Law Enforcement and
Cybercrime
• Since cybercrime is so attractive to offenders, law
enforcement has difficulty investigating these
offenses.
– There are multiple levels of law enforcement
which handle cases based on their jurisdictional
responsibilities.
• Local law enforcement.
• State/Provincial police.
• Federal/National Police Forces.

CC7177 Cyber Crime and Cyber Security


Wall’s Typology of
Cybercrime
• Cyber-Trespass
– Individuals cross boundaries of computer systems
into areas where ownership has already been
established.
• Hackers, crackers, phreakers.
• Cyber-Deception/Theft
– Criminal acquisitions that can occur on-line.
• Pirates, fraudsters, and hackers.

CC7177 Cyber Crime and Cyber Security


Wall’s Typology of
Cybercrime
• Cyber-Porn/Obscenity
– Pedophiles, cam whores, pornographers.
• Not always criminal.
• Sexual services.
• Cyber-Violence
– Violence against individuals or groups on-line.
• Cyberstalking.
• Cyberhate.
• Tech-talk.

CC7177 Cyber Crime and Cyber Security

Vous aimerez peut-être aussi