網路犯罪案例cybercrimecase

上传人:tian****1990 文档编号:82587543 上传时间:2019-02-24 格式:PPT 页数:21 大小:5.09MB
返回 下载 相关 举报
網路犯罪案例cybercrimecase_第1页
第1页 / 共21页
網路犯罪案例cybercrimecase_第2页
第2页 / 共21页
網路犯罪案例cybercrimecase_第3页
第3页 / 共21页
網路犯罪案例cybercrimecase_第4页
第4页 / 共21页
網路犯罪案例cybercrimecase_第5页
第5页 / 共21页
点击查看更多>>
资源描述

《網路犯罪案例cybercrimecase》由会员分享,可在线阅读,更多相关《網路犯罪案例cybercrimecase(21页珍藏版)》请在金锄头文库上搜索。

1、1,Cybercrime,Decision Group / CEO Casper Kan Chang Chang_.tw,2,Two Major categories of Cybercrime,Reconstructable network Packet,Non-Reconstructable Network Packet,Traditional crimes committed via Internet. Examples: Internet Auction fraud, trafficking in contraband goods, Internet sexual assault, i

2、nternet-advertising bank loans fraud,Crimes committed via internet Examples : Spreading Virus, Hacking, Illegal Access, Illegal interception, Data Interference and communication Interference.,Evidence from ,Crime operation methods,Network Packet,3,Cybercrime Investigation Steps,An initial complaint

3、is received and background intelligence information checks are completed,4,Case Study of Cybercrime,Crime Time Crime location Corpus delicti Crime method Perpetrator Analysis Criminal damage Criminal charges,Evidence Collection,Internet Interception,Complete Forensic analysis and interpret the evide

4、nce found for legal/courtroom setting,5,Collection of Cyber Crime Information,Computer Audit Record Collection : To collect the login audit records of the victim including DNS, IP, Account details, MAC and local times etc User Login credential authentication: To check users login credentials includi

5、ng user account, name, address, phone etc To obtain the computer communication record and contents: including E-mail, IM chat, web browsing and file transfers etc Suspects statements : criminal offence etc The seizure of the suspects computer audit records : Web, IP, account, MAC and time etc,6,Inte

6、rnet advertising bank loan fraud case-1,In May 2009 KCGPB (Kaohsiung City Government Police Bureau) announced that they had received a number of bank reports alleging forged documents fraudulently representing bids for credit. This resulted in bank loan frauds with huge financial losses. An in-depth

7、 investigation revealed that the offenders flooded xx shares with others to form the fraud group. They used a domestic portal website for free web space to falsely post or sticker advertising published in the Office of credit and information. This was done to attract the much-needed cash flow of the

8、 head customer. The members of the Group forged tax, payroll and other documents to falsely strengthen the lenders financial resources and created documents to mislead the head bank customer whose credit bid to financial institutions was caught in an error of the approved loan, the group charged the

9、 customer exorbitant fees to gain large profits of financial fraud.,7,Internet advertising bank loan fraud case,8,Internet Sexual Assault cases!,Internet sexual assault cases in 2007: Daily 1.5 case, more than 60% are 12-18 years old. June 10, 2009 Apple Daily Taipei Taiwan,Two suspects,9,Is truly p

10、athetic and inferior to animals,July 2008 Taipei; two suspects use the Internet to invite Female net friends to participate in a party. The Female net friend is used to meet a woman at a Motel, and in turn require a sexual relationship. The victim refuses to cooperate and is physically abused and ra

11、ped. The police arrested the two suspects and further investigations revealed that as many as a dozen other people had been injured. The victims are unwilling to report to the police due to humiliation. The police monitor the network address of the motel access to number and are able to obtain enoug

12、h evidence to arrest tow suspects. The police linked the two offenders to other crimes committed in July 2008 . Questioning of the offenders revealed various nicknames were used by yahoo messenger and Peas chat rooms and various other websites. The suspects revealed that another 5 or 6 offenders had

13、 assisted in the crimes. Police are continuing their investigations and tracing the other accomplices.,10,Hacker Data Theft 1 Hacker Su x-jung work for the underworld to steal data,2007/09/22 China Times / Taipei / Choi Min-Yue CIB High-Technology Crime Prevention Center and Technology have found th

14、at the Internet nickname ”Odin“ a Lin, high-school sophomore, and the nickname ”CB” Su x-jung, used an academic department as the backbone network springboard with a host hidden within a Taiwan Academic Network. The use of Trojan horse programs, together with web site vulnerabilities against well-kn

15、own Web sites were used to harvest intrusive information and then, to circumvent tracing, stored this data on a foreign hosted website. Xx telecom companies user accounts and password were compromised with more than 2.4 million pins stolen. Some websites have been damaged by having their programs re

16、moved.,Hacker Su x-jung,11,Hacker Data Theft 2 Hacker Su x-jung works for the underworld to steal data,12,Forensics tools,To assist in the forensic acquisition of digital evidence, it is essential that every computer crime investigator has access to the correct forensic hardware and software tools. This plays a critical role in the detection of computer related crimes as well as the collection and analysis of evidence.,13,Network Packet Forensics Classifica

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 高等教育 > 大学课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号