SlideShare a Scribd company logo
Cyber Crime – “Is theCyber Crime – “Is the
Internet the new “Internet the new “WWildild
WWildild WWest?”est?”
Prepared for the Southern MassachusettsPrepared for the Southern Massachusetts
E-Commerce NetworkE-Commerce Network
Nov 5 2004Nov 5 2004
byby
Suzanne MelloSuzanne Mello
www.suzannemello.comwww.suzannemello.com
E-Commerce Network - Suzanne Mello - Nov 5 2004
In the News…….In the News…….
1 out of 5 children received a1 out of 5 children received a
sexual solicitation or approachsexual solicitation or approach
over the Internet in a one-yearover the Internet in a one-year
period of timeperiod of time
(www.missingchildren.com)(www.missingchildren.com)
California warns of massive IDCalifornia warns of massive ID
theft – personal data stolen fromtheft – personal data stolen from
computers at University ofcomputers at University of
California, Berkeley (Oct 21, 2004California, Berkeley (Oct 21, 2004
IDG news service)IDG news service)
Microsoft and Cisco announced aMicrosoft and Cisco announced a
new initiative to work together tonew initiative to work together to
increase internet securityincrease internet security
(Oct 18, 2004(Oct 18, 2004
www.cnetnews.com)www.cnetnews.com)
E-Commerce Network - Suzanne Mello - Nov 5 2004
The New Wild Wild WestThe New Wild Wild West
More cyber criminals thanMore cyber criminals than
cyber copscyber cops
Criminals feel “safe”Criminals feel “safe”
committing crimes fromcommitting crimes from
the privacy of their ownthe privacy of their own
homeshomes
Brand new challengesBrand new challenges
facing law enforcementfacing law enforcement

Most not trained in theMost not trained in the
technologiestechnologies

Internet crimes spanInternet crimes span
multiple jurisdictionsmultiple jurisdictions

Need to retrofit new crimesNeed to retrofit new crimes
to existing lawsto existing laws
E-Commerce Network - Suzanne Mello - Nov 5 2004
Computer CrimeComputer Crime
Computer used to commitComputer used to commit
a crimea crime

Child porn, threateningChild porn, threatening
email, assumingemail, assuming
someone’s identity, sexualsomeone’s identity, sexual
harassment, defamation,harassment, defamation,
spam, phishingspam, phishing
Computer as a target of aComputer as a target of a
crimecrime

Viruses, worms, industrialViruses, worms, industrial
espionage, software piracy,espionage, software piracy,
hackinghacking
E-Commerce Network - Suzanne Mello - Nov 5 2004
Computer ForensicsComputer Forensics
What is it?What is it?

an autopsy of a computer or network toan autopsy of a computer or network to
uncover digital evidence of a crimeuncover digital evidence of a crime

Evidence must be preserved and hold upEvidence must be preserved and hold up
in a court of lawin a court of law
Growing field – Many becomingGrowing field – Many becoming
computer forensic savvycomputer forensic savvy

FBI, State and Local Police, IRS,FBI, State and Local Police, IRS,
Homeland SecurityHomeland Security

Defense attorneys, judges andDefense attorneys, judges and
prosecutorsprosecutors

Independent security agenciesIndependent security agencies

White hat or Ethical HackersWhite hat or Ethical Hackers

Programs offered at major universitiesPrograms offered at major universities
such as URIsuch as URI
http://homepage.cs.uri.edu/faculty/wolfe/cfhttp://homepage.cs.uri.edu/faculty/wolfe/cf
E-Commerce Network - Suzanne Mello - Nov 5 2004
Uncovering Digital EvidenceUncovering Digital Evidence
Smart Criminals don’t use theirSmart Criminals don’t use their
own computersown computers
Floppy disksFloppy disks
Zip/Jazz disksZip/Jazz disks
TapesTapes
Digital camerasDigital cameras
Memory sticksMemory sticks
PrintersPrinters
CDsCDs
PDAsPDAs
Game boxesGame boxes
NetworksNetworks
Hard drivesHard drives
E-Commerce Network - Suzanne Mello - Nov 5 2004
Digital EvidenceDigital Evidence
Criminals Hide EvidenceCriminals Hide Evidence
Delete their files and emailsDelete their files and emails
Hide their files by encryption,Hide their files by encryption,
password protection, orpassword protection, or
embedding them in unrelatedembedding them in unrelated
files (dll, os etc)files (dll, os etc)
Use Wi-Fi networks and cyberUse Wi-Fi networks and cyber
cafes to cover their trackscafes to cover their tracks
Forensics Uncover EvidenceForensics Uncover Evidence
Restore deleted files and emails –Restore deleted files and emails –
they are still really there!they are still really there!
Find the hidden files throughFind the hidden files through
complex password, encryptioncomplex password, encryption
programs, and searchingprograms, and searching
techniquestechniques
Track them down through theTrack them down through the
digital trail - IP addresses to ISPsdigital trail - IP addresses to ISPs
to the offenderto the offender
Not obvious…….it’s most likely hidden on purpose
or needs to be unearthed by forensics experts
E-Commerce Network - Suzanne Mello - Nov 5 2004
The Crime SceneThe Crime Scene
(with Computer Forensics)(with Computer Forensics)
Similar to traditional crime scenesSimilar to traditional crime scenes

Must acquire the evidence whileMust acquire the evidence while
preserving the integrity of thepreserving the integrity of the
evidenceevidence
No damage during collection,No damage during collection,
transportation, or storagetransportation, or storage
Document everythingDocument everything
Collect everything the first timeCollect everything the first time

Establish a chain of custodyEstablish a chain of custody
But also different…….But also different…….

Can perform analysis of evidence onCan perform analysis of evidence on
exact copy!exact copy!

Make many copies and investigateMake many copies and investigate
them without touching originalthem without touching original

Can use time stamping/hash codeCan use time stamping/hash code
techniques to prove evidence hasn’ttechniques to prove evidence hasn’t
been compromisedbeen compromised
Top Cyber Crimes thatTop Cyber Crimes that
Attack BusinessAttack Business
SpamSpam
Viruses/WormsViruses/Worms
Industrial Espionage and HackersIndustrial Espionage and Hackers
Wi-Fi High JackingWi-Fi High Jacking
E-Commerce Network - Suzanne Mello - Nov 5 2004
SpamSpam
““Spam accounts for 9 out of every 10Spam accounts for 9 out of every 10
emails in the United States.”emails in the United States.”
MessageLabs, Inc., an email managementMessageLabs, Inc., an email management
and security company based in Newand security company based in New
York.York.
““We do not object to the use of this slangWe do not object to the use of this slang
term to describe UCE (unsolicitedterm to describe UCE (unsolicited
commercial email), although we docommercial email), although we do
object to the use of the word “spam” asobject to the use of the word “spam” as
a trademark and the use of our producta trademark and the use of our product
image in association with that term”image in association with that term”
www.hormel.comwww.hormel.com
E-Commerce Network - Suzanne Mello - Nov 5 2004
Can-Spam Act of 2003Can-Spam Act of 2003
Controlling the Assault of Non-Solicited Pornography and MarketingControlling the Assault of Non-Solicited Pornography and Marketing
Act (Can-Spam)Act (Can-Spam)
Signed into law by President Bush on Dec 16, 2003Signed into law by President Bush on Dec 16, 2003

Took effect Jan 1, 2004Took effect Jan 1, 2004
Unsolicited commercial email must:Unsolicited commercial email must:

Be labeledBe labeled

Include Opt-Out instructionsInclude Opt-Out instructions

No false headersNo false headers
FTC is authorized (but not required) to establish a “do-not-email”FTC is authorized (but not required) to establish a “do-not-email”
registryregistry
www.spamlaws.com –lists all the latest in federal, state, andwww.spamlaws.com –lists all the latest in federal, state, and
international lawsinternational laws
Suzanne Mello - Nov 5 2004
Spam is HostileSpam is Hostile
You pay for Spam, not SpammersYou pay for Spam, not Spammers

Email costs are paid by emailEmail costs are paid by email
recipientsrecipients
Spam can be dangerousSpam can be dangerous

Never click on the opt-out link!Never click on the opt-out link!
May take you to hostile web siteMay take you to hostile web site
where mouse-over downloadswhere mouse-over downloads
an .exean .exe

Tells spammers they found aTells spammers they found a
working addressworking address

They won’t take you off the listThey won’t take you off the list
anywayanyway
What should you do?What should you do?

Filter it out whenever possibleFilter it out whenever possible

Keep filters up to dateKeep filters up to date

If you get it, just delete the emailIf you get it, just delete the email
E-Commerce Network - Suzanne Mello - Nov 5 2004
Viruses and WormsViruses and Worms
Different types of “ailments”Different types of “ailments”
VirusesViruses

software that piggybacks onsoftware that piggybacks on
other software and runs whenother software and runs when
you run something elseyou run something else

Macro in excel, wordMacro in excel, word
Transmitted through sharingTransmitted through sharing
programs on bulletin boardsprograms on bulletin boards
Passing around floppy disksPassing around floppy disks

An .exe, .com file in your emailAn .exe, .com file in your email
WormsWorms

software that uses computersoftware that uses computer
networks to find security holesnetworks to find security holes
to get in to your computer –to get in to your computer –
usually in Microsoft OS!! Butusually in Microsoft OS!! But
worm for MAC was recentlyworm for MAC was recently
writtenwritten
E-Commerce Network - Suzanne Mello - Nov 5 2004
Hackers are EverywhereHackers are Everywhere
Stealing dataStealing data

Industrial EspionageIndustrial Espionage

Identity theftIdentity theft

DefamationDefamation
Deleting data for funDeleting data for fun

A lot of bored 16 year olds late atA lot of bored 16 year olds late at
nightnight
Turning computers into zombiesTurning computers into zombies

To commit crimesTo commit crimes

Take down networksTake down networks

Distribute pornDistribute porn

Harass someoneHarass someone
Ethical/white hat hackers exist tooEthical/white hat hackers exist too

Help break into networks toHelp break into networks to
prevent crimesprevent crimes
Mafia Boy
E-Commerce Network - Suzanne Mello - Nov 5 2004
Wireless Fidelity (Wi-Fi)Wireless Fidelity (Wi-Fi)
Using antennas to create “hot spots”Using antennas to create “hot spots”
Hotspots – Internet Access (sometimes free)Hotspots – Internet Access (sometimes free)

Newport Harbor - All the boats in Harbor have internet accessNewport Harbor - All the boats in Harbor have internet access

San Francisco Giants Stadium – Surf the web while catching aSan Francisco Giants Stadium – Surf the web while catching a
gamegame

UMass (need to register, but it’s free)UMass (need to register, but it’s free)

Cambridge, MACambridge, MA

Philadelphia, PA – just announced – entire city by 2006Philadelphia, PA – just announced – entire city by 2006
E-Commerce Network - Suzanne Mello - Nov 5 2004
Wi-Fi High JackingWi-Fi High Jacking
60-70% wireless networks are wide open60-70% wireless networks are wide open
Why are the Wi-Fi networks unprotected?Why are the Wi-Fi networks unprotected?

Most people say “Our data is boring”Most people say “Our data is boring”

But… criminals look for wireless networks to commitBut… criminals look for wireless networks to commit
their crimestheir crimes

And… the authorities will come knocking on yourAnd… the authorities will come knocking on your
door…..door…..
E-Commerce Network - Suzanne Mello - Nov 5 2004
Protect your Computers!Protect your Computers!
Use anti-virus software andUse anti-virus software and
firewalls - keep them up to datefirewalls - keep them up to date
Keep your operating system up toKeep your operating system up to
date with critical security updatesdate with critical security updates
and patchesand patches
Don't open emails or attachmentsDon't open emails or attachments
from unknown sourcesfrom unknown sources
Use hard-to-guess passwords.Use hard-to-guess passwords.
Don’t use words found in aDon’t use words found in a
dictionary. Remember thatdictionary. Remember that
password cracking tools existpassword cracking tools exist
Back-up your computer data onBack-up your computer data on
disks or CDs oftendisks or CDs often
Don't share access to yourDon't share access to your
computers with strangerscomputers with strangers
IfIf you have a wi-fi network,you have a wi-fi network,
password protect itpassword protect it
Disconnect from the InternetDisconnect from the Internet
when not in usewhen not in use
Reevaluate your security on aReevaluate your security on a
regular basisregular basis
Make sure your employees andMake sure your employees and
family members know this infofamily members know this info
too!too!
Thank you!Thank you!
E-Commerce Network - Suzanne Mello - Nov 5 2004
Web sites of InterestWeb sites of Interest
http://homepage.cs.uri.edu/faculty/wolfe/cfhttp://homepage.cs.uri.edu/faculty/wolfe/cf
www.missingchildren.comwww.missingchildren.com
www.spamlaws.comwww.spamlaws.com
www.netsmartz.orgwww.netsmartz.org
http://www.ifccfbi.gov - operation web snare – latesthttp://www.ifccfbi.gov - operation web snare – latest
cyber crimes to be aware ofcyber crimes to be aware of
http://www.dcfl.gov/dc3/home.htmhttp://www.dcfl.gov/dc3/home.htm
http://www.cops.org/http://www.cops.org/

More Related Content

What's hot

Powerpoint
PowerpointPowerpoint
Powerpoint
Marcelomazzocato
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online_chimes_
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
Stephen Thomas, CISSP
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)itgsabc
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpointTy122987
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...FecomercioSP
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 
Deeply Inspired Designs Porfolio
Deeply Inspired Designs PorfolioDeeply Inspired Designs Porfolio
Deeply Inspired Designs Porfolio
Natalie Acevedo
 
Natalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digitalNatalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digital
Natalie Acevedo
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
OWASP Foundation
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life Examples
SyedAmoz
 

What's hot (15)

Powerpoint
PowerpointPowerpoint
Powerpoint
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Deeply Inspired Designs Porfolio
Deeply Inspired Designs PorfolioDeeply Inspired Designs Porfolio
Deeply Inspired Designs Porfolio
 
Natalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digitalNatalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digital
 
Report to IPA
Report to IPAReport to IPA
Report to IPA
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life Examples
 

Similar to Cybercrime (1)

Cybercrime
CybercrimeCybercrime
Cybercrime
Mayank Garg
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
Drishti Bhalla
 
Icac peer to peer presentation
Icac peer to peer presentationIcac peer to peer presentation
Icac peer to peer presentationjpl17
 
Cyber crime in WORLD
Cyber crime in WORLDCyber crime in WORLD
Cyber crime in WORLD
Avasyu Gupta
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
satish kumar
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Identity Theft business
Identity Theft businessIdentity Theft business
Identity Theft businessMatt Smith
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 
Computer safety
Computer safetyComputer safety
Computer safety
Anaamorales27
 
Computer saftey may 2013
Computer saftey may 2013Computer saftey may 2013
Computer saftey may 2013JimWhite
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
pixvilx
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
CakraWicaksono3
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
PR Americas
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptx
MouradAKenk
 
Tracking and Surveillance
Tracking and SurveillanceTracking and Surveillance
Tracking and Surveillance
Hi Tech Criminal Justice
 

Similar to Cybercrime (1) (20)

Cybercrimeg
CybercrimegCybercrimeg
Cybercrimeg
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Icac peer to peer presentation
Icac peer to peer presentationIcac peer to peer presentation
Icac peer to peer presentation
 
Cyber crime in WORLD
Cyber crime in WORLDCyber crime in WORLD
Cyber crime in WORLD
 
sanfranAIG3
sanfranAIG3sanfranAIG3
sanfranAIG3
 
N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Users guide
Users guideUsers guide
Users guide
 
Identity Theft business
Identity Theft businessIdentity Theft business
Identity Theft business
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Computer saftey may 2013
Computer saftey may 2013Computer saftey may 2013
Computer saftey may 2013
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptx
 
Tracking and Surveillance
Tracking and SurveillanceTracking and Surveillance
Tracking and Surveillance
 

More from aw222

Ig2s
Ig2sIg2s
Ig2s
aw222
 
Hardware
HardwareHardware
Hardware
aw222
 
Hacking and-defense
Hacking and-defenseHacking and-defense
Hacking and-defense
aw222
 
Cybercrime
CybercrimeCybercrime
Cybercrime
aw222
 
02topologi jaringan
02topologi jaringan02topologi jaringan
02topologi jaringan
aw222
 
01 pengantar internet
01 pengantar internet01 pengantar internet
01 pengantar internet
aw222
 
00 sejarah internet
00 sejarah internet00 sejarah internet
00 sejarah internet
aw222
 
Jaringan internet1
Jaringan internet1Jaringan internet1
Jaringan internet1
aw222
 
01 pengenalan internet dan teknologinya
01   pengenalan internet dan teknologinya01   pengenalan internet dan teknologinya
01 pengenalan internet dan teknologinya
aw222
 
Sistem informasi untuk pendidikan (c)
Sistem informasi untuk pendidikan (c)Sistem informasi untuk pendidikan (c)
Sistem informasi untuk pendidikan (c)
aw222
 
Presentation sistem-jaringan-internet
Presentation sistem-jaringan-internetPresentation sistem-jaringan-internet
Presentation sistem-jaringan-internet
aw222
 
Ppt teknologi-jaringan-komputer-02-1999
Ppt teknologi-jaringan-komputer-02-1999Ppt teknologi-jaringan-komputer-02-1999
Ppt teknologi-jaringan-komputer-02-1999
aw222
 
Ppt internet-untuk-pendidikan-01-1999
Ppt internet-untuk-pendidikan-01-1999Ppt internet-untuk-pendidikan-01-1999
Ppt internet-untuk-pendidikan-01-1999
aw222
 
Pertemuan 14-koneksi-internet
Pertemuan 14-koneksi-internetPertemuan 14-koneksi-internet
Pertemuan 14-koneksi-internet
aw222
 
Proses sains 2
Proses sains 2Proses sains 2
Proses sains 2
aw222
 
Proses sains 1
Proses sains 1Proses sains 1
Proses sains 1
aw222
 
Proses sains 4
Proses sains 4Proses sains 4
Proses sains 4
aw222
 
Proses sains 3
Proses sains 3Proses sains 3
Proses sains 3
aw222
 
Natuna keterampilan proses sains
Natuna keterampilan proses sains Natuna keterampilan proses sains
Natuna keterampilan proses sains
aw222
 
Keterampilan proses ok
Keterampilan proses okKeterampilan proses ok
Keterampilan proses ok
aw222
 

More from aw222 (20)

Ig2s
Ig2sIg2s
Ig2s
 
Hardware
HardwareHardware
Hardware
 
Hacking and-defense
Hacking and-defenseHacking and-defense
Hacking and-defense
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
02topologi jaringan
02topologi jaringan02topologi jaringan
02topologi jaringan
 
01 pengantar internet
01 pengantar internet01 pengantar internet
01 pengantar internet
 
00 sejarah internet
00 sejarah internet00 sejarah internet
00 sejarah internet
 
Jaringan internet1
Jaringan internet1Jaringan internet1
Jaringan internet1
 
01 pengenalan internet dan teknologinya
01   pengenalan internet dan teknologinya01   pengenalan internet dan teknologinya
01 pengenalan internet dan teknologinya
 
Sistem informasi untuk pendidikan (c)
Sistem informasi untuk pendidikan (c)Sistem informasi untuk pendidikan (c)
Sistem informasi untuk pendidikan (c)
 
Presentation sistem-jaringan-internet
Presentation sistem-jaringan-internetPresentation sistem-jaringan-internet
Presentation sistem-jaringan-internet
 
Ppt teknologi-jaringan-komputer-02-1999
Ppt teknologi-jaringan-komputer-02-1999Ppt teknologi-jaringan-komputer-02-1999
Ppt teknologi-jaringan-komputer-02-1999
 
Ppt internet-untuk-pendidikan-01-1999
Ppt internet-untuk-pendidikan-01-1999Ppt internet-untuk-pendidikan-01-1999
Ppt internet-untuk-pendidikan-01-1999
 
Pertemuan 14-koneksi-internet
Pertemuan 14-koneksi-internetPertemuan 14-koneksi-internet
Pertemuan 14-koneksi-internet
 
Proses sains 2
Proses sains 2Proses sains 2
Proses sains 2
 
Proses sains 1
Proses sains 1Proses sains 1
Proses sains 1
 
Proses sains 4
Proses sains 4Proses sains 4
Proses sains 4
 
Proses sains 3
Proses sains 3Proses sains 3
Proses sains 3
 
Natuna keterampilan proses sains
Natuna keterampilan proses sains Natuna keterampilan proses sains
Natuna keterampilan proses sains
 
Keterampilan proses ok
Keterampilan proses okKeterampilan proses ok
Keterampilan proses ok
 

Recently uploaded

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 

Recently uploaded (20)

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 

Cybercrime (1)

  • 1. Cyber Crime – “Is theCyber Crime – “Is the Internet the new “Internet the new “WWildild WWildild WWest?”est?” Prepared for the Southern MassachusettsPrepared for the Southern Massachusetts E-Commerce NetworkE-Commerce Network Nov 5 2004Nov 5 2004 byby Suzanne MelloSuzanne Mello www.suzannemello.comwww.suzannemello.com
  • 2. E-Commerce Network - Suzanne Mello - Nov 5 2004 In the News…….In the News……. 1 out of 5 children received a1 out of 5 children received a sexual solicitation or approachsexual solicitation or approach over the Internet in a one-yearover the Internet in a one-year period of timeperiod of time (www.missingchildren.com)(www.missingchildren.com) California warns of massive IDCalifornia warns of massive ID theft – personal data stolen fromtheft – personal data stolen from computers at University ofcomputers at University of California, Berkeley (Oct 21, 2004California, Berkeley (Oct 21, 2004 IDG news service)IDG news service) Microsoft and Cisco announced aMicrosoft and Cisco announced a new initiative to work together tonew initiative to work together to increase internet securityincrease internet security (Oct 18, 2004(Oct 18, 2004 www.cnetnews.com)www.cnetnews.com)
  • 3. E-Commerce Network - Suzanne Mello - Nov 5 2004 The New Wild Wild WestThe New Wild Wild West More cyber criminals thanMore cyber criminals than cyber copscyber cops Criminals feel “safe”Criminals feel “safe” committing crimes fromcommitting crimes from the privacy of their ownthe privacy of their own homeshomes Brand new challengesBrand new challenges facing law enforcementfacing law enforcement  Most not trained in theMost not trained in the technologiestechnologies  Internet crimes spanInternet crimes span multiple jurisdictionsmultiple jurisdictions  Need to retrofit new crimesNeed to retrofit new crimes to existing lawsto existing laws
  • 4. E-Commerce Network - Suzanne Mello - Nov 5 2004 Computer CrimeComputer Crime Computer used to commitComputer used to commit a crimea crime  Child porn, threateningChild porn, threatening email, assumingemail, assuming someone’s identity, sexualsomeone’s identity, sexual harassment, defamation,harassment, defamation, spam, phishingspam, phishing Computer as a target of aComputer as a target of a crimecrime  Viruses, worms, industrialViruses, worms, industrial espionage, software piracy,espionage, software piracy, hackinghacking
  • 5. E-Commerce Network - Suzanne Mello - Nov 5 2004 Computer ForensicsComputer Forensics What is it?What is it?  an autopsy of a computer or network toan autopsy of a computer or network to uncover digital evidence of a crimeuncover digital evidence of a crime  Evidence must be preserved and hold upEvidence must be preserved and hold up in a court of lawin a court of law Growing field – Many becomingGrowing field – Many becoming computer forensic savvycomputer forensic savvy  FBI, State and Local Police, IRS,FBI, State and Local Police, IRS, Homeland SecurityHomeland Security  Defense attorneys, judges andDefense attorneys, judges and prosecutorsprosecutors  Independent security agenciesIndependent security agencies  White hat or Ethical HackersWhite hat or Ethical Hackers  Programs offered at major universitiesPrograms offered at major universities such as URIsuch as URI http://homepage.cs.uri.edu/faculty/wolfe/cfhttp://homepage.cs.uri.edu/faculty/wolfe/cf
  • 6. E-Commerce Network - Suzanne Mello - Nov 5 2004 Uncovering Digital EvidenceUncovering Digital Evidence Smart Criminals don’t use theirSmart Criminals don’t use their own computersown computers Floppy disksFloppy disks Zip/Jazz disksZip/Jazz disks TapesTapes Digital camerasDigital cameras Memory sticksMemory sticks PrintersPrinters CDsCDs PDAsPDAs Game boxesGame boxes NetworksNetworks Hard drivesHard drives
  • 7. E-Commerce Network - Suzanne Mello - Nov 5 2004 Digital EvidenceDigital Evidence Criminals Hide EvidenceCriminals Hide Evidence Delete their files and emailsDelete their files and emails Hide their files by encryption,Hide their files by encryption, password protection, orpassword protection, or embedding them in unrelatedembedding them in unrelated files (dll, os etc)files (dll, os etc) Use Wi-Fi networks and cyberUse Wi-Fi networks and cyber cafes to cover their trackscafes to cover their tracks Forensics Uncover EvidenceForensics Uncover Evidence Restore deleted files and emails –Restore deleted files and emails – they are still really there!they are still really there! Find the hidden files throughFind the hidden files through complex password, encryptioncomplex password, encryption programs, and searchingprograms, and searching techniquestechniques Track them down through theTrack them down through the digital trail - IP addresses to ISPsdigital trail - IP addresses to ISPs to the offenderto the offender Not obvious…….it’s most likely hidden on purpose or needs to be unearthed by forensics experts
  • 8. E-Commerce Network - Suzanne Mello - Nov 5 2004 The Crime SceneThe Crime Scene (with Computer Forensics)(with Computer Forensics) Similar to traditional crime scenesSimilar to traditional crime scenes  Must acquire the evidence whileMust acquire the evidence while preserving the integrity of thepreserving the integrity of the evidenceevidence No damage during collection,No damage during collection, transportation, or storagetransportation, or storage Document everythingDocument everything Collect everything the first timeCollect everything the first time  Establish a chain of custodyEstablish a chain of custody But also different…….But also different…….  Can perform analysis of evidence onCan perform analysis of evidence on exact copy!exact copy!  Make many copies and investigateMake many copies and investigate them without touching originalthem without touching original  Can use time stamping/hash codeCan use time stamping/hash code techniques to prove evidence hasn’ttechniques to prove evidence hasn’t been compromisedbeen compromised
  • 9. Top Cyber Crimes thatTop Cyber Crimes that Attack BusinessAttack Business SpamSpam Viruses/WormsViruses/Worms Industrial Espionage and HackersIndustrial Espionage and Hackers Wi-Fi High JackingWi-Fi High Jacking
  • 10. E-Commerce Network - Suzanne Mello - Nov 5 2004 SpamSpam ““Spam accounts for 9 out of every 10Spam accounts for 9 out of every 10 emails in the United States.”emails in the United States.” MessageLabs, Inc., an email managementMessageLabs, Inc., an email management and security company based in Newand security company based in New York.York. ““We do not object to the use of this slangWe do not object to the use of this slang term to describe UCE (unsolicitedterm to describe UCE (unsolicited commercial email), although we docommercial email), although we do object to the use of the word “spam” asobject to the use of the word “spam” as a trademark and the use of our producta trademark and the use of our product image in association with that term”image in association with that term” www.hormel.comwww.hormel.com
  • 11. E-Commerce Network - Suzanne Mello - Nov 5 2004 Can-Spam Act of 2003Can-Spam Act of 2003 Controlling the Assault of Non-Solicited Pornography and MarketingControlling the Assault of Non-Solicited Pornography and Marketing Act (Can-Spam)Act (Can-Spam) Signed into law by President Bush on Dec 16, 2003Signed into law by President Bush on Dec 16, 2003  Took effect Jan 1, 2004Took effect Jan 1, 2004 Unsolicited commercial email must:Unsolicited commercial email must:  Be labeledBe labeled  Include Opt-Out instructionsInclude Opt-Out instructions  No false headersNo false headers FTC is authorized (but not required) to establish a “do-not-email”FTC is authorized (but not required) to establish a “do-not-email” registryregistry www.spamlaws.com –lists all the latest in federal, state, andwww.spamlaws.com –lists all the latest in federal, state, and international lawsinternational laws
  • 12. Suzanne Mello - Nov 5 2004 Spam is HostileSpam is Hostile You pay for Spam, not SpammersYou pay for Spam, not Spammers  Email costs are paid by emailEmail costs are paid by email recipientsrecipients Spam can be dangerousSpam can be dangerous  Never click on the opt-out link!Never click on the opt-out link! May take you to hostile web siteMay take you to hostile web site where mouse-over downloadswhere mouse-over downloads an .exean .exe  Tells spammers they found aTells spammers they found a working addressworking address  They won’t take you off the listThey won’t take you off the list anywayanyway What should you do?What should you do?  Filter it out whenever possibleFilter it out whenever possible  Keep filters up to dateKeep filters up to date  If you get it, just delete the emailIf you get it, just delete the email
  • 13. E-Commerce Network - Suzanne Mello - Nov 5 2004 Viruses and WormsViruses and Worms Different types of “ailments”Different types of “ailments” VirusesViruses  software that piggybacks onsoftware that piggybacks on other software and runs whenother software and runs when you run something elseyou run something else  Macro in excel, wordMacro in excel, word Transmitted through sharingTransmitted through sharing programs on bulletin boardsprograms on bulletin boards Passing around floppy disksPassing around floppy disks  An .exe, .com file in your emailAn .exe, .com file in your email WormsWorms  software that uses computersoftware that uses computer networks to find security holesnetworks to find security holes to get in to your computer –to get in to your computer – usually in Microsoft OS!! Butusually in Microsoft OS!! But worm for MAC was recentlyworm for MAC was recently writtenwritten
  • 14. E-Commerce Network - Suzanne Mello - Nov 5 2004 Hackers are EverywhereHackers are Everywhere Stealing dataStealing data  Industrial EspionageIndustrial Espionage  Identity theftIdentity theft  DefamationDefamation Deleting data for funDeleting data for fun  A lot of bored 16 year olds late atA lot of bored 16 year olds late at nightnight Turning computers into zombiesTurning computers into zombies  To commit crimesTo commit crimes  Take down networksTake down networks  Distribute pornDistribute porn  Harass someoneHarass someone Ethical/white hat hackers exist tooEthical/white hat hackers exist too  Help break into networks toHelp break into networks to prevent crimesprevent crimes Mafia Boy
  • 15. E-Commerce Network - Suzanne Mello - Nov 5 2004 Wireless Fidelity (Wi-Fi)Wireless Fidelity (Wi-Fi) Using antennas to create “hot spots”Using antennas to create “hot spots” Hotspots – Internet Access (sometimes free)Hotspots – Internet Access (sometimes free)  Newport Harbor - All the boats in Harbor have internet accessNewport Harbor - All the boats in Harbor have internet access  San Francisco Giants Stadium – Surf the web while catching aSan Francisco Giants Stadium – Surf the web while catching a gamegame  UMass (need to register, but it’s free)UMass (need to register, but it’s free)  Cambridge, MACambridge, MA  Philadelphia, PA – just announced – entire city by 2006Philadelphia, PA – just announced – entire city by 2006
  • 16. E-Commerce Network - Suzanne Mello - Nov 5 2004 Wi-Fi High JackingWi-Fi High Jacking 60-70% wireless networks are wide open60-70% wireless networks are wide open Why are the Wi-Fi networks unprotected?Why are the Wi-Fi networks unprotected?  Most people say “Our data is boring”Most people say “Our data is boring”  But… criminals look for wireless networks to commitBut… criminals look for wireless networks to commit their crimestheir crimes  And… the authorities will come knocking on yourAnd… the authorities will come knocking on your door…..door…..
  • 17. E-Commerce Network - Suzanne Mello - Nov 5 2004 Protect your Computers!Protect your Computers! Use anti-virus software andUse anti-virus software and firewalls - keep them up to datefirewalls - keep them up to date Keep your operating system up toKeep your operating system up to date with critical security updatesdate with critical security updates and patchesand patches Don't open emails or attachmentsDon't open emails or attachments from unknown sourcesfrom unknown sources Use hard-to-guess passwords.Use hard-to-guess passwords. Don’t use words found in aDon’t use words found in a dictionary. Remember thatdictionary. Remember that password cracking tools existpassword cracking tools exist Back-up your computer data onBack-up your computer data on disks or CDs oftendisks or CDs often Don't share access to yourDon't share access to your computers with strangerscomputers with strangers IfIf you have a wi-fi network,you have a wi-fi network, password protect itpassword protect it Disconnect from the InternetDisconnect from the Internet when not in usewhen not in use Reevaluate your security on aReevaluate your security on a regular basisregular basis Make sure your employees andMake sure your employees and family members know this infofamily members know this info too!too!
  • 19. E-Commerce Network - Suzanne Mello - Nov 5 2004 Web sites of InterestWeb sites of Interest http://homepage.cs.uri.edu/faculty/wolfe/cfhttp://homepage.cs.uri.edu/faculty/wolfe/cf www.missingchildren.comwww.missingchildren.com www.spamlaws.comwww.spamlaws.com www.netsmartz.orgwww.netsmartz.org http://www.ifccfbi.gov - operation web snare – latesthttp://www.ifccfbi.gov - operation web snare – latest cyber crimes to be aware ofcyber crimes to be aware of http://www.dcfl.gov/dc3/home.htmhttp://www.dcfl.gov/dc3/home.htm http://www.cops.org/http://www.cops.org/