Cybercrimes Against Persons Presentation

Cybercrimes Against Persons

Patty BishopBCC/401January 9, 2017Bobby Kemp

Statistics

Most common Cyber Crimes against businesses

Malware

1. Malware- an umbrella term that covers many types of intrusions, such as Trojans, viruses and worms.

Phishing

Phishing is typically done via email and includes a link that carries you to an imitation of a legitimate site.

Denial of Service Attacks

Disrupts your business from connecting to the server. This is usually accomplished by flooding your server with traffic and data.

how criminals commit these cybercrimes

Insider Threats

Unhappy EmployeesDisgruntled former employeesEmployees who unintentionally commit crimes

Insider Threats Continued

how criminals commit these cybercrimes 2

Phishing Scams

Email with links to official looking sites Ask for updated information

Malware

Can be contained in emailsEmbedded in legitimate websites

how criminals commit these cybercrimes 3

Denial of Service Attacks

Bombards your server with traffic or dataEffectively shuts off outside traffic Also shuts off your business reaching outside

how law enforcement agencies investigate cybercrimes

Who Investigates

The lead investigators into cyber-crime is the Federal Bureau of Investigation.Local and State Law Enforcement focus on the smaller cases

How To Investigate

Starts from a complaintInvestigation begins by tracking the IP addressMust Move FastISPs keep information for only 30 days

how law enforcement agencies Can prevent cybercrimes

The FBI Recommends

Keeping your firewall on and up to dateKeep your operating system up to dateInstall or Update your virus protectionTurn off the computer when not in useEducating yourself and your employeesKeeping Security Protocols

Conclusion

Stay VigilantKeep EducatedKeep Up To Date

References

 FBI. (2016). Cyber Crime. Retrieved from Federal Bureau of Investigation: https://www.fbi.gov/investigate/cyberGriffen, R. C. (2012). CyberCrime. Journal of International Commercial Law & Technology, 7(2), 136-153.Rege‐Patwardhan, A. (2009). Cybercrimes against critical infrastructures: a study of online criminal organization and techniques. Criminal Justice Studies, 22(3), 261-271. doi:10.1080/14786010903166965Sullivan, M. (2016). 8 Types of Cyber Attacks Your Business Needs to Avoid. Retrieved from QuickBooks Resource Center: http://quickbooks.intuit.com/r/technology-and-security/8-types-of-cyber-attacks-your-business-needs-to-avoid/Wexler, C. (2014). Cybercrime: A New Critical Issue. Retrieved from Police Forum: http://www.policeforum.org/assets/docs/Critical_Issues_Series_2/the%20role%20of%20local%20law%20enforcement%20agencies%20in%20preventing%20and%20investigating%20cybercrime%202014.pdf

Place an Order

Plagiarism Free!

Scroll to Top