Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 6: COMPUTER CRIME - Coggle Diagram
CHAPTER 6: COMPUTER CRIME
6.2 Fraud and Identity Theft
Identity Theft
Various crimes in which a criminal or large group uses the identity of an unknowing,innocent person
Technique used to commit identity theft
Phishing
Pharming
Online resumes and job hunting
Technique used to protect personal and financial information
Activate for new credit card
Retailer do not print the full card number and expiration date on receipts
Software detect unusual spending
Third party service allow customer to make a purchase without revealing their credit card information
Responses to Identity Theft
Authentication of e-mail and Web Sites
Use of encryption
Authenticating customers to prevent use of stolen numbers
Fraud alert can flag your credit report
6.4 Search and Seizure of Computer
Search and seizure of computers
Automated search
Requires a warrant to search and seize a computer
Issue of Venue
Charges are generally filed where the crime occurs
Cyber crime treaty
To foster international cooperation among law agencies at different countries to fight cyber crime
Whose laws rule on the web
Corporation that do business in multiple countries must comply with the law of all countries involved
6.1 Hacking
Computer Crime
Crime that involves computer
Definition of Hacking
Gain illegal or unauthorized access to a file,computer or network
Hacktivism
Use of hacking to promote a political cause
The Law:Catching and Punishing Hackers
Method for catching hacker
Law enforcement agents
Security professional
Computer forensics
Penalties for young hackers
Matured
Received fines,probation
Juvenile detention
Security
Use of firewall
Responsibility for Security
Each job must include security as their goal
6.3 Scam and Digital Forgery
Auction
FTC reports that online that online auction sites are one of the top sources of fraud complaint
Stock Fraud
Most common method is to buy a stock low,send out e-mails urging others to buy,and the sell when the price goes up,usually only for a short time
Click Fraud
Repeated clicking onan ad to either increase a sites's revenue or to use up a competitor's advertising budget
Digital Forgery
New technology are used to create fake checks,passports,visas,birth certificate with little skill and investment
6.6 Emergence Cyber Law in Malaysia
Computer Crimes Act 1997
Communication and Multimedia Act (CMA) 1998
Telemedicine Act 1997
Information Technology Act 2000
Copyright (Amendment) Act 1997
The Induce Act
Digital Signature Act 1997
6.5 Analytical Tools in Cyber Crime
Fraud
Reason
Identify the right claims to focus on
Automate time consuming processes
Detect fraud early
Tool
Splunk
FICO
Fraud.net Guardian
Fractals
Hacking
Reason
Sense and detect suspicious/doubtful applications which are able to leak private information/financial settlement/company's secret
Tool
NetPatrol
sXe Injected
SMS-smishing hacking detector