VIRGINIA COMMONWEALTH UNIVERSITY POLICE THE TECHNICAL SIDE OF THE INTERNET & COMPUTER CRIME Officer Troy C. Ross Webmaster...
An Introduction to the Net As of the year 2000, the Internet has become an international collection of over 9.7 million co...
How Computers Connect Every computer that is connected to the Internet depends on Internet Protocol (IP) to communicate wi...
How Computers Connect 128.172.101.102 128.172.101.302 128.172.101.199 ISP Server ISP Server ISP Server Typical Diagram of ...
Surfin’ The Web Most people who surf the web use  browsers, such as Microsoft Internet  Explorer™ or Netscape Communicator...
Information Exchange When computers connect, certain information can be exchanged. For instance, some web  sites can log y...
Online Protection There is no fool-proof way to protect your computer 100%, with the exception of turning it off. But you ...
An Intro to Computer Crime The most common Internet crime is online fraud. This occurs when you go online,  make a purchas...
Malicious Users Online A 'hacker' is someone who enjoys the  challenge of deciphering programs and  stretching the capabil...
Malicious Users at Work There are programs that are available today that allow malicious users to gain access to other  co...
Malicious Users at Work
Why is Cybercrime Increasing? <ul><li>Connectivity is Global - no boundaries </li></ul><ul><li>Numerous vulnerable targets...
Trends & Methods <ul><li>Forgery trend growing </li></ul><ul><li>Use of consumer accounts for fraud </li></ul><ul><li>Iden...
E-commerce <ul><li>E-commerce may reach $13 billion dollars this year alone </li></ul><ul><li>FDIC estimated that most ban...
What are we up Against? <ul><li>Transparent technology - you can’t touch this </li></ul><ul><li>Assumptions that “it will ...
What are the Laws?
Possession of Child Pornography “ Possession of sexually explicit visual material utilizing or having as a subject a perso...
Production of Child Pornography Production, publication, sale, possession with intent to distribute, financing, distributi...
Seizure and Forfeiture Seizure and forfeiture of all audio and visual equipment, electronic equipment, devices and other p...
Use of communications systems to facilitate certain offenses Click to view statute: Code of Virginia   § 18.2-374.3 Includ...
Virginia Computer Crime Act <ul><li>§ 18.2-152.2  Definitions  </li></ul><ul><li>§ 18 .2-152.3  Computer fraud  </li></ul>...
Cyber Stalking Any person who on more than one occasion engages in conduct directed at another person with the intent to p...
Cyber Threats Any person who knowingly communicates, including an electronically transmitted communication a threat to kil...
Harassment by Computer Any person, with the intent to coerce, intimidate, or harass any person, shall use a computer or co...
Communicating Identifying Information Any person, with the intent to coerce, intimidate, or harass another person, publish...
“Hacked” Statistics <ul><li>Of 2738 organizations, 90% reported security breaches in past 12 months </li></ul><ul><li>70% ...
Is it Investigated? <ul><li>36% of respondents in CSI survey reported the computer crime(s) to Law Enforcement (a signific...
HOW DO I PROTECT MYSELF MY FAMILY, AND MY COMPUTER?
Software Protection At a very basic level, everyone using the Internet should have software installed  on their computer t...
Hardware Protection At the next level, everyone using the Internet may want to have hardware  installed on their computer ...
What your Network should Be Your Computer with Anti-Virus and Firewall Software Installed (Excellent Protection) Your PC c...
Online Safety Tips <ul><li>Register your PC with Operation PC-ID </li></ul><ul><li>Never leave a notebook PC unattended in...
More Online Safety Tips <ul><li>Beware of file attachments - Trojans </li></ul><ul><li>Purchase online from reputable busi...
Informational Videos Web Surfing,  Security , and Privacy Online Internet Security,  Hacks , and Trojan Horses   Are You P...
Test Your PC Now Privacy Analysis of Your Connection Test the Security of Your PC Online   Test Your Computer’s Firewall O...
Reading Resources Latest Internet Fraud Trends Internet Fraud Preventative Measures   How You Are Being Traced Over the Ne...
Brought to you by VCU POLICE DEPARTMENT 918 W. FRANKLIN STREET RICHMOND, VA. 23834 (804) 828-1196 PRESENTATION BY: OFFICER...
Upcoming SlideShare
Loading in …5
×

The Technical Side of Internet

273 views
242 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
273
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

The Technical Side of Internet

  1. 1. VIRGINIA COMMONWEALTH UNIVERSITY POLICE THE TECHNICAL SIDE OF THE INTERNET & COMPUTER CRIME Officer Troy C. Ross Webmaster, VCU Police
  2. 2. An Introduction to the Net As of the year 2000, the Internet has become an international collection of over 9.7 million computer networks, all very capable of communicating with one another. Approximately 300 million people world-wide have access to the Internet (122.6 million of them being in the United States). So how do each of these computers connect with one another?
  3. 3. How Computers Connect Every computer that is connected to the Internet depends on Internet Protocol (IP) to communicate with one another. Each computer has an IP Address. An example of an IP Address may look like 128.172.101.102. The first set of digit(s) in this example, 128, identifies a section of the main Internet system. The next set of digit(s), 172, identifies a specific network. The next set of digit(s), 101, identifies a section or department of the specific network. Finally, the last set of digit(s), 102, identifies a specific computer within that network.
  4. 4. How Computers Connect 128.172.101.102 128.172.101.302 128.172.101.199 ISP Server ISP Server ISP Server Typical Diagram of a Network
  5. 5. Surfin’ The Web Most people who surf the web use browsers, such as Microsoft Internet Explorer™ or Netscape Communicator™. These browsers allow your computer to connect to servers (computers that store web site files and &quot;serves&quot; them to you when requested). These communications over the net are not private. Nearly everything is sent unencrypted and can be easily read.
  6. 6. Information Exchange When computers connect, certain information can be exchanged. For instance, some web sites can log your IP address. Others can place on your hard drive a &quot;cookie&quot; (a text file that is stored in the hard drive of your computer, telling the server things about you, your computer and your activities). Web browsers can be customized in their settings to accept or reject the cookie. Passwords stored in your computer can possibly be read by programs operated by malicious users, either locally (physically at your computer) or remotely (through the web).
  7. 7. Online Protection There is no fool-proof way to protect your computer 100%, with the exception of turning it off. But you can protect it about 99% of the time, with the right tools. There is a large amount of software available that can protect you and your computer. Anti-virus programs can block trojan files, worm files, and viruses from infecting your computer. These harmful things can make it vulnerable to outside attacks by malicious users. Firewall programs can keep other computers from connecting to yours through unguarded ports on your PC. Certain hardware connected to your computer, such as barricades, can 'hide' your computer from others on the web.
  8. 8. An Intro to Computer Crime The most common Internet crime is online fraud. This occurs when you go online, make a purchase from someone, and the product is never delivered. This often occurs on auction sites. Fraudulent sites may obtain your credit card information in order to make purchases on your credit. Some users may become victim to email pyramid get-rich-quick schemes. You may unknowingly become a victim when the damage is already done.
  9. 9. Malicious Users Online A 'hacker' is someone who enjoys the challenge of deciphering programs and stretching the capabilities of a program or a computer. They are not necessarily malicious users. A 'cracker' is a term used for persons who intentionally codes or utilizes programs to bypass security functions with the intent to gain private information or unauthorized access to a computer or number of computers.
  10. 10. Malicious Users at Work There are programs that are available today that allow malicious users to gain access to other computers and their programs. They use these hacks for several purposes, ranging from causing simple mischief to major damage. One type of program can 'steal' a password or passwords allowing the malicious user to do things such as access your email account, login to an Instant Messenger program and pretend to be you, or access your online banking. Another type of program can connect their computer to yours in a 'stealth mode' where you would not even be aware. It usually requires that your computer already be infected by a trojan program so that same trojan program can open up your computer to theirs. Once done, and if the program is strong in capabilities, the malicious user can do most anything with your computer remotely. They could access and view all your files on your hard drive, turn on your microphone or webcam, erase your hard drive(s) and even turn your computer off. The fact remains that technology has evolved greatly from the age of the Abacus. Protection is what ALL users of the web need most.
  11. 11. Malicious Users at Work
  12. 12. Why is Cybercrime Increasing? <ul><li>Connectivity is Global - no boundaries </li></ul><ul><li>Numerous vulnerable targets </li></ul><ul><li>Easy concealment - Anonymous Hacks </li></ul><ul><li>Low equipment costs and access </li></ul><ul><li>Less technical skill required </li></ul><ul><li>Ability to obtain tools, exploits, and vulnerabilities via the Web </li></ul>
  13. 13. Trends & Methods <ul><li>Forgery trend growing </li></ul><ul><li>Use of consumer accounts for fraud </li></ul><ul><li>Identity theft - possibly made available by your computer </li></ul><ul><li>Theft of Credit Card numbers </li></ul><ul><li>Online Auction Fraud </li></ul><ul><li>Child Pornography and Exploitation </li></ul><ul><li>Online Banking Fraud </li></ul>
  14. 14. E-commerce <ul><li>E-commerce may reach $13 billion dollars this year alone </li></ul><ul><li>FDIC estimated that most banks currently have web sites </li></ul><ul><li>GAO estimated that 380 banks offer direct dial-in services </li></ul><ul><li>Booz-Allen stated, “There were 16 million cyber-banking customers as of 2000” (and it’s growing) </li></ul>
  15. 15. What are we up Against? <ul><li>Transparent technology - you can’t touch this </li></ul><ul><li>Assumptions that “it will take care of itself” </li></ul><ul><li>Unseen background “attacks” by malicious users </li></ul><ul><li>Lack of Knowledge - “I just don’t understand this stuff” </li></ul>
  16. 16. What are the Laws?
  17. 17. Possession of Child Pornography “ Possession of sexually explicit visual material utilizing or having as a subject a person less than eighteen years of age” Click to view statute: Code of Virginia § 18.2-374.1:1
  18. 18. Production of Child Pornography Production, publication, sale, possession with intent to distribute, financing, distribution, etc., of sexually explicit items involving children; presumption as to age; severability Click to view statute: Code of Virginia § 18.2-374.1
  19. 19. Seizure and Forfeiture Seizure and forfeiture of all audio and visual equipment, electronic equipment, devices and other personal property used in connection with the production, distribution, publication, sale, possession with intent to distribute or making of child pornography following conviction of §18.2- 374.1 Click to view statute: Code of Virginia § 18.2-374.2
  20. 20. Use of communications systems to facilitate certain offenses Click to view statute: Code of Virginia § 18.2-374.3 Includes making personal contact or direct contact through any agent or agency, any print medium, the United States mail, any common carrier or communication common carrier, any electronic communications system, or any telecommunications, wire, computer, or radio communications system.
  21. 21. Virginia Computer Crime Act <ul><li>§ 18.2-152.2 Definitions </li></ul><ul><li>§ 18 .2-152.3 Computer fraud </li></ul><ul><li>§ 18.2-152.4 Computer trespass </li></ul><ul><li>§ 18.2-152.5 Computer invasion of privacy </li></ul><ul><li>§ 18.2-152.6 Theft of computer services </li></ul><ul><li>§ 18.2-152.7 Personal trespass by computer </li></ul><ul><li>§ 18.2-152.7:1 Harassment by computer </li></ul><ul><li>§ 18.2-152.8 Property capable of embezzlement </li></ul><ul><li>§ 18.2-152.9 Limitation of prosecution </li></ul><ul><li>§ 18.2-152.10 Venue for prosecution </li></ul><ul><li>§ 18.2-152.11 Article not exclusive </li></ul><ul><li>§ 18.2-152.12 Civil relief; damages </li></ul><ul><li>§ 18.2-152.13 Severability </li></ul><ul><li>§ 18.2-152.14 Computer as instrument of forgery </li></ul><ul><li>§ 18.2-152.15 Encryption used in criminal activity </li></ul>Click to view statute
  22. 22. Cyber Stalking Any person who on more than one occasion engages in conduct directed at another person with the intent to place, or when he knows or reasonably should know that the conduct places that other person in reasonable fear of death, criminal sexual assault, or bodily injury to that other person or to that other person's family or household member Click to view statute: Code of Virginia § 18.2-60
  23. 23. Cyber Threats Any person who knowingly communicates, including an electronically transmitted communication a threat to kill or do bodily injury to a person Click to view statute: Code of Virginia § 18.2-60
  24. 24. Harassment by Computer Any person, with the intent to coerce, intimidate, or harass any person, shall use a computer or computer network to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language, or make any suggestion or proposal of an obscene nature, or threaten any illegal or immoral act Click to view statute: Code of Virginia § 18.2-152.7:1
  25. 25. Communicating Identifying Information Any person, with the intent to coerce, intimidate, or harass another person, publishes the person's name or photograph along with identifying information as defined in clauses (iii) through (ix), or clause (xii) of subsection C of § 18.2-186.3 Click to view statute: Code of Virginia § 18.2-186.4
  26. 26. “Hacked” Statistics <ul><li>Of 2738 organizations, 90% reported security breaches in past 12 months </li></ul><ul><li>70% detected serious breaches - info theft, fraud, outside penetration </li></ul><ul><li>74% reported financial loss </li></ul><ul><li>only 42% could estimate losses - $265,589,940 total (based on 2000 CSI survey) </li></ul>
  27. 27. Is it Investigated? <ul><li>36% of respondents in CSI survey reported the computer crime(s) to Law Enforcement (a significant increase from the year 2000 when only 25% reported any offenses) </li></ul><ul><li>Law Enforcement needs to know to investigate </li></ul>
  28. 28. HOW DO I PROTECT MYSELF MY FAMILY, AND MY COMPUTER?
  29. 29. Software Protection At a very basic level, everyone using the Internet should have software installed on their computer to protect it. Virginia Commonwealth University does not endorse these commercial providers or products unless otherwise noted. http://www.at.vcu.edu/faq/nav.html http://www.mcafee.com/ http://www.zonealarm.com/
  30. 30. Hardware Protection At the next level, everyone using the Internet may want to have hardware installed on their computer to protect it. Virginia Commonwealth University does not endorse these commercial providers or products unless otherwise noted. NetGear FS105 - http://www.netgear.com SMC Barricade - http://www.smc.com/
  31. 31. What your Network should Be Your Computer with Anti-Virus and Firewall Software Installed (Excellent Protection) Your PC connects to the router or switch via Ethernet cable Your Router or Switch - Hardware Protection at Best Router or Switch connects to Cable Modem or Direct Ethernet to your ISP Server Your ISP’s Server connects you to the rest of the World Wide Web
  32. 32. Online Safety Tips <ul><li>Register your PC with Operation PC-ID </li></ul><ul><li>Never leave a notebook PC unattended in public - it’s an easy steal </li></ul><ul><li>When not in use - shutdown PC </li></ul><ul><li>Close a program when not in use </li></ul><ul><li>Never save or store passwords on a PC </li></ul><ul><li>Use STRONG passwords - no easy guess </li></ul>WEBLINK: OPERATION PC-ID
  33. 33. More Online Safety Tips <ul><li>Beware of file attachments - Trojans </li></ul><ul><li>Purchase online from reputable businesses with secured Browser </li></ul><ul><li>Beware of get-rich-quick emails </li></ul><ul><li>Update anti-virus software weekly </li></ul><ul><li>Set browser options to maximum protection </li></ul><ul><li>Never give out personal information! </li></ul>
  34. 34. Informational Videos Web Surfing, Security , and Privacy Online Internet Security, Hacks , and Trojan Horses Are You Protected? Find Out! Test Your System Using ShieldsUP to learn how to Secure your System Is Your Firewall doing its Job? Find Out! These links connect to videos online. Steve Gibson (Internet Security Expert), Leo Laporte (ZDTV), and Kate Botello discuss Internet Security, information your PC is revealing, and ways you can test your system for safety and privacy. These videos are in Windows Media format. Please allow time for buffering.
  35. 35. Test Your PC Now Privacy Analysis of Your Connection Test the Security of Your PC Online Test Your Computer’s Firewall Online These online tests can actually tell you how vulnerable your computer system is online. If you wonder what information your computer is sending out to the world, these links will tell you. These sites are 100% safe and fully tested. The test results are accurate.
  36. 36. Reading Resources Latest Internet Fraud Trends Internet Fraud Preventative Measures How You Are Being Traced Over the Net The IP Address - Your Internet Identity
  37. 37. Brought to you by VCU POLICE DEPARTMENT 918 W. FRANKLIN STREET RICHMOND, VA. 23834 (804) 828-1196 PRESENTATION BY: OFFICER TROY C. ROSS WEBMASTER, VCUPD UNIT 1420 WWW.VCU.EDU/POLICE

×