Please enable JavaScript.
Coggle requires JavaScript to display documents.
Computer Crime - Coggle Diagram
Computer Crime
What?
any crime that involves a computer and a network
Category
Target computer network devices
Malware
Uses computer networks & devices
Hacking
Fraud & identity theft
Phishing scams
Hacking
What?
to gain illegal or unauthorized access to a file, computer or network
History
Phase 1: early 1960s to 1970s
a positive term
Hacker - creative programmer who wrote elegant or clever code
Hack - clever piece of code
Phase 2: from 1970s to mid 1990s
took negative term
breaks into computers for which the hacker does not have authorized access
spreads computer worms & viruses
Phone phreaking - manipulate phone systems
Phase 3: beginning with the mid 1990s
Hacktivism surfaced
Denial-of-service (DoS)
Large scale theft
Hacktivism
political hacking
use of hacking to promote a political cause
Example
Prodrug
Pro-zapatista
Identity Theft & Credit Card Fraud
a criminal or large group that uses the identity of an unknowing, innocent person
Techniques used to steal
Phishing
Pharming
Techniques used to protect
Activation for new credit cards
Do not expose card information
Use monitoring software
Responses
Use authentication
Use encryption
Authenticate customers
Scams and Forgery
a dishonest scheme / a fraud
Example
Click fraud
Stock Fraud
Digital Forgery
Analytical Tools for Cyber Crime
Fraud Analytical Tool
Hacking Analytical Tool
Fraud Detection Tools
Fraud.net Guardian
Splunk
FICO
Fractals
Hack detection tools
NetPatrol
sXe Injected
SMS - smishing hacking detector
Cybercrime Treaty
to foster international cooperation among law agencies at different countries tp fight cybercrime