Motives:Before 2000: Experimentation, ego, pranks2000 - 2003: Political, social, or economic statements (dawn of "hacktivism")2003 - 2005: All about the $$$, hactivism becomes extortion and espionage2005 to present: Organized large scale crimeOrganizationalBefore 2000: Individuals2000 - 2003: "Loose confederations of individuals with unique abilities", two or three friends with common underground interests2003 - 2005: Criminal gangs with a dozen or more members2005 to present: Constellations of large groups who specialize in one or more criminal enterprises, working together in strategic alliances to dilute risk and foster their industryEconomic GainBefore 2000: Personal satisfaction, perceived elevated status in the herd ("haXor ch1xz!")2000 - 2003: A few hundred to a few thousand dollars for custom code, services, stolen credit card numbers2003 - 2005: A career, $10,000 to $100,000 per year in ransom, rental of botnets, stolen identities2005 to present: $1+ million proven, tens or hundreds of millions attempted
Cyber Crime: Stay Safe Online
STAY SAFE ONLINE
What is Cyber Crime?Cyber Crime is an online or Internet-basedillegal act 2
Contemporary Security Challenges and Vulnerabilities
A firewall is hardware and/or software that protects a network’s resources from intrusion 11
Intrusion detection software • Analyzes all network traffic • Assesses system vulnerabilities • Identifies any unauthorized intrusions • Notifies network administrators of suspicious behavior patterns or security breachesHoneypot • Vulnerable computer that is set up to entice an intruder to break into itPage 564 Discovering Computers 2010: Living in a Digital World Chapter 11 12
Protect Your Personal Information. Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site. Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password. Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals. Write it down and keep it safe: Everyone can forget a password. Keep a list thats stored in a safe, secure place away from your computer. Own your online presence: When available, set the privacy and security settings on websites to your comfort level for information sharing. Its ok to limit who you share information with.