Date post: | 14-Apr-2018 |
Category: |
Documents |
Upload: | golden-saragih |
View: | 221 times |
Download: | 0 times |
of 26
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
1/26
1
CYBER CRIMECOMPUTER AND INTERNET FRAUD
BY:KIM HONG (123101038)
Master of Accounting Program
Trisakti University
Jakarta
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
2/26
2
FRAUD TRANSITION ERAS
Computer specialist, attorneys, MBAs, Wall Street
professionals, etc.;
Illegal activities focuses on cyber crimes;
Criminal activities centered on tax evasion, money
laundering, computer and internet frauds.
Geek-olithic Era
(1980-present)
3.
College graduates (accountant) and sons of
mobsters (SMOB);Illegal activities such as casino, legitimate &
illegitimate businesses;
Criminal activities centered on tax evasion and
money laundering.
Neolithic Era
(1960-1980)
2.
Individual to mob such as Al Capone, God Father;
Illegal activities such as alcohol, gambling,
prostitution, guns, and drugs;Criminal activities centered on bribes, kickbacks,
laundering cash, and evading taxes.
Paleolithic Era
(1920-1960)
1.
CHARACTERISTICSFRAUD ERANO.
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
3/26
3
COMPUTER FRAUD
Computer fraud is any defalcation or embezzlementaccomplished by tampering with computer programs, datafiles, operations, equipment, or media, and resulting inlosses sustained by the organization whose computersystem was compromised. The intention is to execute afraudulent scheme or financial criminal act.
It can be difficult to detect by fraud examiner or forensicprofessional because it:
. Lacks a traditional paper audit trail;
. Requires understanding of the technology used to commit the crime;
. Requires an understanding of the technology of the victim computer;
. Requires use computer specialists to assist the fraud examiner.
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
4/26
4
COMPUTER CRIME
Computer crime is an act where the computer hardware,software, or data is altered, destroyed, manipulated, orcompromised due to acts that are not intended. It is acrime that is committed where the computer or electronicdata device is integral to the criminal act.
The function of computer in crime is fourfold:. As an Object: physical sabotage, theft, or destruction of information;
. As a Subject: technologists use to commit the crime such as virus
attacks, illegal access, etc.;. As a Tool: electronic device is used to commit the crime such as
embezzlement, theft of information, or hacking;
. As a Symbol: it is as a victim into investment, pyramid, other
traditional fraud schemes adapted to digital environment.
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
5/26
5
CYBER CRIME FACT
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
6/26
6
NORTON CYBER CRIME SURVEY
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
7/26
7
CYBER CRIME IN INDONESIA
Based on Symantec Corporation Survey:
Conducted in April 2010; 499 respondents (male and female=
6:4);
Attacked at least 86% internet users;
Completion of cyber crime cases was
36 days; Average cost IDR11,558,945
(USD1,265).SURVEY
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
8/26
8
CYBER CRIME ATTACK
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
9/26
9
CYBER CRIME FACTS
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
10/26
10
COMPUTER HACKING
Hacker= computer enthusiast;
someone seeking unauthorized access tocomputer systems & its information.
Hackers include employees, individuals operatingalone, hacker gangs, and entrepreneurial hackers
who seek financial reward for their illegal acts.
Hacking:
. Breaking computer systems guess users accesscodes;
. Social engineering: enter a company to reveal
information.
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
11/26
11
HACKING METHODS
Trojan Horse Virus: converting instruction to unauthorizedaccess;
Trap Doors: inserting instruction in a program to circumventcontrol hackers take advantage of it;
Salami Techniques: unauthorized program to steal smallamount from asset, e.g. interest rounding at banking;
Logic Bombs: executing at specific event, e.g. deleting payrollif the user name is removed;
Data Diddling: changing data before or during entry intocomputer system, e.g. replacing valid disk with modified ones;
Scavenging & Dumpster Diving: obtaining data from the trashby knowing user name;
Data Leakage: removing, smuggling, hiding information fromfacility;
Piggybacking/Impersonation: gaining restricted area usingusers password & tapping to terminal link;
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
12/26
12
HACKING METHODS
Simulation & Modeling: manipulation to plan or controlcriminal act;
Wire Tapping: taking transmitted data between computers.Encryption can minimize it;
Network Weaving: looping using network to avoid detection;
Altering Password Generation: using randomizer to generatename and password;
Buffer Overflow Exploits: overflowing a program to altersystem files, installing backdoors, etc.;
Privilege Escalation Exploits: unauthorized access to exploitgrand administrator or root level access to users;
Backdoors: remote access to the system at a point time;
HTTP Exploits: performing malicious activities to web serverapplications;
Anti-hacker Measures: remote access to customers, vendors,and suppliers to companys server.
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
13/26
13
HACKER DETECTION PROGRAM
Print & review log files;
Administer passwords;
Maintain security software;
Review system activity reports;
Follow up on potential security violations;
Review telecommunication security.
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
14/26
14
COMPUTER VIRUSES
Computer virus is a hidden computer programs thatuse computer resources or other computer activities
to shut down or slow the system significantly. Infected computers resources to replicate itself and
spread the infection to other computer systems on anetwork, internet, email, text messages, infectedsoftware, shared program application, demonstrationsoftware, freeware, and shareware.
Diversity from harmless (displaying a message or
greeting) to those that shut down entire computernetwork, ruin data, or destroy the ability of computerfunction.
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
15/26
15
TYPES OF COMPUTER VIRUSES
Macro virus;
Boot sector virus;
Parasitic virus; TSRAM virus;
Application software virus;
Multi-partite virus; Tequila virus;
Polymorphic virus;
Stealth virus; Mutation engine virus;
Network virus;
Worm.
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
16/26
16
VIRUS ATTACK INDICATORS
Decreasing free space;
System slow down;
An increase size of some files; Operating system behaving abnormal;
Unusual messages and graphics;
Inability to boot system and access files; Unexplained and repeated maintenance repairs;
System or data file disappeared or fragmented;
Unexplained changes in memory & program sizes; Displaying messages that virus has been
encountered.
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
17/26
17
VIRUS INVESTIGATION & PREVENTION
Isolating systems and all media;
Running virus software;
Document finding;
Interviewing system custodian & all users toidentify its symptoms, damage, & system mallfunction;
Following audit trail of infection; Determining source of virus;
Do not use external device to boot the system;
Do not install unauthorized software; Use anti virus software to detect potential viruses;
Back up program & files;
Be caution in opening attachment.
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
18/26
18
INTERNET FRAUD SCHEMES
1%Internet access services10.
1%Work at home plans9.
1%Information/adult services8.
1%Advance fee loans7.
2%Phishing6.
4%Lotteries/lottery clubs5.
6%False checks4.
8%Nigerian money offers3.
30%General merchandise sales2.
42%Online auction1.
% COMPLAINTSINTERNET SCHEMESNO.
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
19/26
19
INTERNET FRAUD PERSPECTIVES
Over 1 billion internet users, 16% of worldspopulation (June 2006);
In US, 69% of population was online,approximately 227 million users;
Internet growth increased 189% (2000-2005);
In US, identity fraud, decreased from 10.1 million
people to 8.9 million people but the average fraudloss increased from $5,249 to $6,383;
In US, total one year cost of identity fraud
increased from $53.2 billion to $56.6 billion (2003-2006);
68% of identity fraud victims incur no out of pocketexpenses;
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
20/26
20
INTERNET FRAUD PERSPECTIVES
To resolve identity fraud cases increased from 33hours (2003) to 40 hours (2006);
30% identity theft from lost/stolen wallets,checkbooks, credit cards;
47% identity theft by friends, neighbors, in-homeemployees, family members, or relatives;
Nearly 70% from consumers shreddingdocuments, now less than 1%;
2.3% was the smallest rate of identity fraud
victims at age 65+; 35-44 age group had the highest average fraud
amount i.e. $9,435.
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
21/26
21
TRADITIONAL INTERNET FRAUD SCHEMES
Get Rich Quick: desire to make easy money;
Pyramid Schemes: marketing or investment referralfraud;
Foreign Trusts: getting tax less life for evasion;
Prime Bank Note: offering high yield investmentschemes;
Chain Letters: intimidating un-fortune events if notdonate certain amounts;
Investment & Securities Fraud: offering advice by
manipulating stock price for fraudsters advantage; Ponzi Scheme: high financial return by using
subsequent investors amount to initial investor;
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
22/26
22
NEW THREAT INTERNET FRAUD SCHEMES
Modem Hijacking: long distance connection fromISPs victim;
Spamming: sending email to subscriber on the list;
Counterfeit Check Scams: taking money by offeringgoods and asking the down payment;
Phishing: tricking business into providing
passwords, account numbers, other sensitive data;
Spear Phishing: fooling employee to get user nameand password to access corporate network;
Pharming: fooling into entering sensitive data intoa malicious website;
Internet auction fraud: offering auction via
internet.
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
23/26
23
COMBATING INTERNET FRAUD
Encrypt confidential information;
Validate user names and passwordinto its protocol;
Do not put financial information,customer data, and other valuabledatabases on the web server;
Put firewall to prevent unauthorizedaccess.
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
24/26
24
MONEY LAUNDERING IN CYBER SPACE
Accounted $500 billion (1996);
4 models: merchant issuer, bank issuer, non-bankissuer, and peer to peer models;
E-gold can be used for money laundering in thetype of transactions: e-commerce, business tobusiness payments, point of service sales, person to
person payments, payroll, bill payments, andcharitable donations;
Combating money laundering through non-
anonymous financial transactions, mapping globalpayment systems, facilitating internationalinformation sharing, knowing your customers,harmonizing and coordinating international money
movement regulations.
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
25/26
25
REPORTING CYBER CRIMES
Law enforcement agencies: Federal Bureau ofInvestigation (FBI); US Secret Service; USImmigration & Customs Enforcement (ICE); US
Postal Inspection Service; Bureau of Alcohol,Tobacco, Firearms, and Explosives (ATF);
Internet Crime Complaint Center (IC3) serves as ameans to receive internet-related criminal
complaints;
In Indonesia, Electronic Information andTransaction Law no. 11 2008 had been approved to
be the reference computer-related events. It isruled from article 27 to article 37. Any violationagainst the rules will be charged according tocriminal law as stated from article 42 until article
52.
7/27/2019 Cybercrime- Computer & Internet Fraud (Fin Present)
26/26
26
SUMMARY & CONCLUSION
1. Crimes has grown to cyber crimes centered on taxevasion, money laundering, computer andinternet frauds.
2. Cyber crimes use computer to take advantage
from the technology weaknesses to enrichpersonal wealth.
3. Top 5 cyber crimes: virus, worms, or othermalicious code (53%), Spyware (41%), Phishing(38%), Unauthorized access (35%),
Unintentional exposure of sensitive information(34%).
4. Security tools and watch can be used to reducethe risk of cyber crimes.
5. Reporting cyber crimes to the authorities isimportant as a way to investigate and take furtheractions.
6. Electronic Information and Transaction Law no.11 2008 is the reference to computer-related
criminal actions in Indonesia.