Cybercrime | IT Secutiry

1,298 views

Published on

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,298
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
104
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Cybercrime | IT Secutiry

  1. 1. CYBERCRIME:ARE YOU THE NEXT VICTIM?
  2. 2. CYBERCRIME:ARE YOU THE NEXT VICTIM? Sandra J. Putnam Assistant Special Agent in Charge Georgia Bureau of Investigation Tina Freestone Chair of the Criminal Justice Degree Program Grantham University
  3. 3. Cost of Cybercrime Norton Cybercrime Report for 2011  431 adult victims globally  Losses of $388 billion (time & money loss)  14 adults become a victim every second  Most common type of cyber crime is computer viruses and malware
  4. 4. Cost of Cybercrime Norton Cybercrime Report for 2011  431 adult victims globally  Losses of $388 billion (time & money loss)  14 adults become a victim every second  Most common type of cyber crime is computer viruses and malware
  5. 5. What is Cybercrime? Computers being used to commit crime Computers as the target of a crime Computers storing evidence of a crime that has been committed
  6. 6. Types of Cybercrime Traditional Crimes Technological Crimes  Child Pornography  Viruses  Human Trafficking  Malware  Identity Theft  Hacking  Drugs Dealing  Denial of Service Attacks  Harassment/Threats  Copyright Violations  Fraud/White Collar Crime  Cyber-Stalking  Murder  Phishing  Theft  Sexting
  7. 7. Challenges to Law Enforcement Computer Literate Criminals  Availability of technology for low or no cost Technology is pushing society into the information age Who is responsible for policing the Internet?  Jurisdiction of crime Training and Equipment costs Evidence Integrity  Physical versus Digital Evidence
  8. 8. How to Protect Yourself Understand that cybercrime exist and your vulnerable Protect your computer with the latest anti-virus and malware software Use good passwords Lock down all social networking sites to only be visible to “FRIENDS” Run an annual credit report Residential wireless router should be encrypted and password protected
  9. 9. AN ICAC CASE STUDYA GBI Internet Crimes Against Children Task ForceInvestigation into finding the identity of 3 little girlswhose images were posted on the Internet.
  10. 10. Investigations
  11. 11. Questions
  12. 12. Grantham University and theCriminal Justice departmentThank You for attending andparticipating in todays Webinar.We encourage you to follow up with anyquestions you may have regardingCriminal Justice or Cybercrime:tfreestone@grantham.eduTina Freestone
  13. 13. Grantham University and theCriminal Justice departmentThank You for attending andparticipating in todays Webinar.We encourage you to follow up with anyquestions you may have regardingCriminal Justice or Cybercrime:tfreestone@grantham.eduTina FreestoneIACP Conference Booth #4711
  14. 14. www.grantham.edu1.888.Y.GRANTHAMCall to speak to a representative today.

×