SlideShare a Scribd company logo
Cybercrime is commonly defined as any illegal action aimed at the integrity of a specific
computer site, or conducted using a computer tool. This definition is based on the use of the
computer medium. Indeed, either the latter is used by the criminal as a tool of a crime or
conventional crime (scam, threat ... etc), or the computer is the target-even targeted by the
criminal (theft, fraudulent use or destruction of data ... etc).
I- Background and justifications
I- Background and justifications
Hackers: this group of criminals gets into computers and networks. Their motives
are varied. Depending on the type of intrusion, hackers are classified into one of
three categories: hackers in white, gray or black hats.
II- CYBERCRIMINALS: WHO ARE THEY
Organized Hackers: These criminals include organizations of cybercriminals, hacktivists, terrorists
and hackers funded by governments. Hacktivists make political statements to raise awareness about
issues that matter to them. Hacktivists make public compromising information about their victims.
Government-sponsored abusers collect information or commit sabotage on behalf of their
governments.
III- TYPOLOGY OF CYBERCRIMINALITY
Piracy techniques are evolving and hardware is no longer the only flaw. New types of attacks are
emerging based on human and social flaws. For example, hackers identify the link between companies
and their partners. Emails are sent from social networks like LinkedIn or Viadeo on behalf of the
partner. The email will be opened without any real mistrust on the part of the employee. This technique
called "social engineering", then allows the hacker to access the user's workstation in the first place
and then evolve in the information system of the company.
Attack of conventional
type
 background extortions;
 credit card fraud;
 breach of trust and miscellaneous scams;
 misappropriation of minors; identity theft
The impact of cybercrime
Cybercrime is very expensive for the global economy! Indeed,
McAfee sponsored a study by CSIS (Center for Strategic and
International Studies) that highlights the economic impact of
cybercrime in our societies. Its cost is estimated at nearly 500 billion
dollars
The impact of cybercrime
Until now, the economic impact of cybercrime has remained difficult to quantify. In
collaboration with CSIS, McAfee has put in place an effective methodology to
accurately estimate the financial losses of this phenomenon in the United States
and internationally. To develop this report, CSIS engaged economists, intellectual
property experts and security researchers.
Estimating the cost of cybercrime and cyber espionage would result
in a $ 100 billion annual loss to the US economy and a 508,000 job
cut. At the global level, this estimate would be close to $ 500
billion.
The impact of cybercrime

More Related Content

What's hot

Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeaking
Adarsh
 
Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...
Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...
Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...
InfinIT - Innovationsnetværket for it
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
What is fraud
What is fraudWhat is fraud
What is fraud
fraudwatch
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017
Invest Northern Ireland
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Securicon
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & Journalism
Paul van Heel
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual property
Carlos Gonsalves
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
NEW LAW COLLEGE PUNE
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
loverakk187
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
MarioTalavera10
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
bala prakash
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
Rajesh Satpathy, Regional College of Management (RCM), Bhubaneswar
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
How secure are you?
How secure are you?How secure are you?
How secure are you?
Joe Morris
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.
Omkar Walavalkar
 
HE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceHE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceBrian Arellanes
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and Fraud
Goutama Bachtiar
 

What's hot (20)

Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeaking
 
Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...
Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...
Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
What is fraud
What is fraudWhat is fraud
What is fraud
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & Journalism
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual property
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
How secure are you?
How secure are you?How secure are you?
How secure are you?
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.
 
HE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceHE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSource
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and Fraud
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 

Similar to Computer security incidents

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
CA.Kolluru Narayanarao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
Kolluru N Rao
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
amit_shanu
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
chrixymae
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
BadarHossain
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
Michele Thomas
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
Jody Sullivan
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
stephaniewaters1212
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Rohit Revo
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Muhammad Hamza
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
ChrisSosaJacob
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
Custom Paper Services
 
Unit 1
Unit 1Unit 1
Unit 1
Jigarthacker
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
VipinRawat52
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Andrea Rossetti
 

Similar to Computer security incidents (20)

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Unit 1
Unit 1Unit 1
Unit 1
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 

Recently uploaded

BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 

Recently uploaded (16)

BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 

Computer security incidents

  • 1.
  • 2. Cybercrime is commonly defined as any illegal action aimed at the integrity of a specific computer site, or conducted using a computer tool. This definition is based on the use of the computer medium. Indeed, either the latter is used by the criminal as a tool of a crime or conventional crime (scam, threat ... etc), or the computer is the target-even targeted by the criminal (theft, fraudulent use or destruction of data ... etc). I- Background and justifications
  • 3. I- Background and justifications Hackers: this group of criminals gets into computers and networks. Their motives are varied. Depending on the type of intrusion, hackers are classified into one of three categories: hackers in white, gray or black hats.
  • 4. II- CYBERCRIMINALS: WHO ARE THEY Organized Hackers: These criminals include organizations of cybercriminals, hacktivists, terrorists and hackers funded by governments. Hacktivists make political statements to raise awareness about issues that matter to them. Hacktivists make public compromising information about their victims. Government-sponsored abusers collect information or commit sabotage on behalf of their governments.
  • 5. III- TYPOLOGY OF CYBERCRIMINALITY Piracy techniques are evolving and hardware is no longer the only flaw. New types of attacks are emerging based on human and social flaws. For example, hackers identify the link between companies and their partners. Emails are sent from social networks like LinkedIn or Viadeo on behalf of the partner. The email will be opened without any real mistrust on the part of the employee. This technique called "social engineering", then allows the hacker to access the user's workstation in the first place and then evolve in the information system of the company.
  • 6. Attack of conventional type  background extortions;  credit card fraud;  breach of trust and miscellaneous scams;  misappropriation of minors; identity theft
  • 7. The impact of cybercrime Cybercrime is very expensive for the global economy! Indeed, McAfee sponsored a study by CSIS (Center for Strategic and International Studies) that highlights the economic impact of cybercrime in our societies. Its cost is estimated at nearly 500 billion dollars
  • 8. The impact of cybercrime Until now, the economic impact of cybercrime has remained difficult to quantify. In collaboration with CSIS, McAfee has put in place an effective methodology to accurately estimate the financial losses of this phenomenon in the United States and internationally. To develop this report, CSIS engaged economists, intellectual property experts and security researchers.
  • 9. Estimating the cost of cybercrime and cyber espionage would result in a $ 100 billion annual loss to the US economy and a 508,000 job cut. At the global level, this estimate would be close to $ 500 billion. The impact of cybercrime