Cybercrimes Against Persons
Patty BishopBCC/401January 9, 2017Bobby Kemp
Statistics
Most common Cyber Crimes against businesses
Malware
1. Malware- an umbrella term that covers many types of intrusions, such as Trojans, viruses and worms.
Phishing
Phishing is typically done via email and includes a link that carries you to an imitation of a legitimate site.
Denial of Service Attacks
Disrupts your business from connecting to the server. This is usually accomplished by flooding your server with traffic and data.
how criminals commit these cybercrimes
Insider Threats
Unhappy EmployeesDisgruntled former employeesEmployees who unintentionally commit crimes
Insider Threats Continued
how criminals commit these cybercrimes 2
Phishing Scams
Email with links to official looking sites Ask for updated information
Malware
Can be contained in emailsEmbedded in legitimate websites
how criminals commit these cybercrimes 3
Denial of Service Attacks
Bombards your server with traffic or dataEffectively shuts off outside traffic Also shuts off your business reaching outside
how law enforcement agencies investigate cybercrimes
Who Investigates
The lead investigators into cyber-crime is the Federal Bureau of Investigation.Local and State Law Enforcement focus on the smaller cases
How To Investigate
Starts from a complaintInvestigation begins by tracking the IP addressMust Move FastISPs keep information for only 30 days
how law enforcement agencies Can prevent cybercrimes
The FBI Recommends
Keeping your firewall on and up to dateKeep your operating system up to dateInstall or Update your virus protectionTurn off the computer when not in useEducating yourself and your employeesKeeping Security Protocols
Conclusion
Stay VigilantKeep EducatedKeep Up To Date
References
FBI. (2016). Cyber Crime. Retrieved from Federal Bureau of Investigation: https://www.fbi.gov/investigate/cyberGriffen, R. C. (2012). CyberCrime. Journal of International Commercial Law & Technology, 7(2), 136-153.Rege‐Patwardhan, A. (2009). Cybercrimes against critical infrastructures: a study of online criminal organization and techniques. Criminal Justice Studies, 22(3), 261-271. doi:10.1080/14786010903166965Sullivan, M. (2016). 8 Types of Cyber Attacks Your Business Needs to Avoid. Retrieved from QuickBooks Resource Center: http://quickbooks.intuit.com/r/technology-and-security/8-types-of-cyber-attacks-your-business-needs-to-avoid/Wexler, C. (2014). Cybercrime: A New Critical Issue. Retrieved from Police Forum: http://www.policeforum.org/assets/docs/Critical_Issues_Series_2/the%20role%20of%20local%20law%20enforcement%20agencies%20in%20preventing%20and%20investigating%20cybercrime%202014.pdf