CYBERCRIME - GROUP 6 PRESENTATION THE GROUP MEMBERS ARE 1.HARMSTONE LUNDU-J17\/0108\/2012 2.CHOLO ARNOLD EUGINE-J17\/0054\/2012 3.MIKE MAINA-J17\/0001\/2012

CYBERCRIME - GROUP 6 PRESENTATION THE GROUP MEMBERS ARE...

This preview shows page 1 - 9 out of 34 pages.

GROUP 6 PRESENTATION THE GROUP MEMBERS ARE: 1.HARMSTONE LUNDU-J17/0108/2012 2.CHOLO ARNOLD EUGINE-J17/0054/2012 3.MIKE MAINA-J17/0001/2012 4.MORRIS NDURERE-J17/0092/2012
Image of page 1
CYBERCRIME, COUNTER MEASURES, E-WASTE AND ITS ENVIRONMENTAL EFFECTS
Image of page 2
Image of page 3
CYBERCRIME Cybercrime refers to crimes that use networks or devices to advance other ends or an illegal act committed by using a computer network or in the internet. The Computer may be used in the commission of the crime or it may be the target. Categories of Cybercrime Against persons-transmission of child pornography, harassment of anyone using email or cyber stalking, obscene materials dissemination Against Property-against all forms of property. They include unauthorized computer trespassing, computer vandalism, transmission of harmful programs, unauthorized possession computerized information. Against Government-cyberspace used by individuals and groups to the international government to threaten the citizens of a country. It manifest itself into terrorism when an individual cracks into a government or military maintained website.
Image of page 4
EXAMPLES OF CYBERCRIMES Hacking- Theft-person violates copyrights and download music, games s/w Cyber stalking-online harassment,victim subjected to barrage of online msg/e online scams and fraud, identity theft- Malicious s/w-internet based sw/programs used to disrupt a network. illegal or prohibited online content(child soliciting n abuse).
Image of page 5
CYBERCRIMES SHARE THREE ELEMENTS 1. Tools and techniques to perpetrate a crime 2. Approach or methodology for executing the criminal plan — known as a vector 3. Crime itself that is the end result of those plans and activities from a general list of cybercrimes compiled by other groups or organizations, most of which focus on the vectors or tools.
Image of page 6
TOP FIVE CYBER CRIMES. 1. TAX-REFUND FRAUD Tax-refund fraud has become rampant in recent years. An article from the October 2012 issue of the Journal of Accountancy relayed a single incident where three defendants were charged with filing more than 5,000 false tax returns using the Social Security numbers of deceased taxpayers to claim fraudulent refunds totaling about $14 million.1 A second article quotes a U.S. Treasury Inspector General Journal of Accountancy of Tax Administration (TIGTA) report that suggests the IRS failed to notice 1.5 million tax returns associated with (potentially identity theft-related) fraudulent tax refunds in excess of $5.2 billion for the 2011 tax season. The IRS simultaneously reported that it detected nearly 1 million tax returns with fraudulent refunds of $6.5 billion in the same tax season.2 The city of Tampa, FL, alone estimates that in the past two years, cybercriminals have cashed in $450 million in fraudulent tax refunds.
Image of page 7
2. CORPORATE ACCOUNT TAKEOVERii During the summer of 2008, a different type of cybercrime was identified — corporate account takeover.
Image of page 8
Image of page 9

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture