Concept of Cyber Crime Investigation: Unit 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

UNIT

1 CONCEPT OF CYBER
CRIME
INVESTIGATION
CDI 9-Introduction to Cyber Crime and Environmental Laws and Protection

Unit Outcomes:
At the end of this module, you should be able to:
1.1 Identify the concept about cyber crime.
1.2 Explain the nature of cyber crime investigation.

ACTIVITY

LET’S GET STARTED!

TASK 1: YOUR THOUGHTS


 Expound the given quotes. What are your thoughts upon hearing it?
1. “The fact is that cyber criminals are opportunistic and will seek any means o take
control of users’ systems ” ― Stacey Quandt
________________________________________________________________
________________________________________________________________
________________________________________________________________

2. “Cybercrime is the greatest threat to every company in the world.”― Ginni


Rommety
________________________________________________________________
________________________________________________________________
________________________________________________________________

ANALYSIS

TASK 2: Answer the following questions in connection to the


scenario below.

Hackers steal £650 million from global banks, 2015. For a period of two
years, ending in early 2015, a group of Russian-based hackers managed to
gain access to secure information from more than 100 institutions around
the world. The cyber criminals used malware to infiltrate banks' computer
systems and gather personal data.They were then able to impersonate
online bank staff to authorize fraudulent transfers, and even order ATM
machines to dispense cash without a bank card. It was estimated that
around £650 million was stolen from the financial institutions in total.

1. Based on the situation given above, what do you think is the applicable law for
the issue at hand?
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________

2. Is the Philippine law applicable for the situation given? Why? Support your
answer.
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
ABSTRACTION

What is Cyber Crime Investigation?


Cybercrime investigation is the process of investigating, analyzing and
recovering digital forensic evidence from the networks involved in the cyber
attack such as user IP logs, admin login logs, analysis of server admin logs,
email account login logs, rule creation logs, local networks and physical devices.
The aim of a cyber crime investigation is to identify the suspects of the digital
crime and to establish what data is stolen and the intention of the suspects.

Cybercrime, or computer oriented crime, is crime that involves a computer and a


network. The computer may have been used in the commission of a crime, or it may be
the target. Cybercrimes can be defined as: "Offences that are committed against
individuals or groups of individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm, or loss, to the victim directly
or indirectly, using modern telecommunication networks such as Internet (networks
including but not limited to Chat rooms, emails, notice boards and groups) and mobile
phones (Bluetooth/SMS/MMS)”.

What is Cyber Crime

Computer or cyber crime is defined as any type of crime that involves or regards a
computer or computer network. Cyber crime means that the computer may be used as
a tool in the commission of the crime, or the computer may be the target of the
criminal's activity.
What Is Net Crime?

Net crime is a more specialized and particular subset of cyber crime, in that it is
defined as the criminal exploitation of the Internet. Net crimes have gained in popularity
and publicity lately, as society is more aware of offenses, such as hacking, copyright
infringement, and child pornography.
What Are the Categories of Computer Crimes?

The United States Department of Justice classifies computer crimes into three major


categories:

 Target—The computer is used by the criminal as a target. The criminal attacks


the computers of third parties to spread viruses or shut them down.
 Weapon—The computer is considered a weapon used to commit any other type
of crime in an assisting capacity, such as use in illegal gambling or child
pornography.
 Accessory—The computer is used as an accessory or way to store or file illegal,
stolen, or criminal activity, such as child pornography, pictures of crime scenes
taken by a murderer, pictures of stalking victims, and/or instructions or manuals
on how to commit crimes.

Because of the serious, damaging, and even deadly ways that a computer can be used
when in the wrong hands, parents, educators, non-profit organizations, federal, state,
and local governments, and even private industry have all been trying to collaborate
and work together to protect our society and in particular, our children. Computer and
modern technology facilitate the illegal work of criminals in ways that allow them to
injure more people, across more miles, faster, and in less detectable ways.
Cyber enabled crimes, cyber and traditional crimes are commonly connected, this is
because the internet has enabled traditional crimes to take place remotely or over the
internet. Traditional crimes have increased in scale by the use of the Internet, Mobile
Phones, BOTs, Social Media, Computer Networks or other forms of ICT such
as cyber-enabled fraud, phishing, attacks and data theft.

Digitpol’s Cyber Crime and Security Investigation experts provider services for
business, we investigate, analyze and recover forensic data from the Internet. Digitpol
utilizes industry standard Internet monitoring platforms to detect keywords and find
evidence on servers globally. Data obtained from cyber channels is most effective
when linked to physical evidence as additional proof.

When Digitpol is engaged, we ensure that no digital evidence is overlooked and assist
at any stage of an investigation, regardless of the size or location of data sources.
Claims of leaks, fraud, cyber espionage, financial tampering, computer crime,
employee misconduct, and other illegal or wrongdoing actions require corporations, law
firms, and government agencies to deploy digital forensic methods to piece together
facts that lead to the truth.

Unauthorised access Investigation 


Digitpol investigates unauthorised cyber access or hacking incidents such as
when someone gains access to your cloud, server or physical device without
your permission. Hackers may gain access to your computer or device through
security weaknesses, malware or phishing. Once they have compromised your
email, banking or social media accounts, they can change passwords preventing
you from accessing your account. Scammers often send out messages
impersonating and directing people to fake websites, or asking them to send
money. Modern attacks are very sophisticated the fake websites may seem to be
genuine.

What is Malware Analysis?


Malware analysis is the study or process of determining the functionality, origin
and potential impact of a given malware sample such as a virus, worm, trojan
horse, rootkit, or backdoor. Cyber Criminals may use malicious software (or
malware) to monitor your online activity and cause damage to the computer.
Malware is often downloaded when people open an infected email attachment or
click a suspicious link in an email. Malware can also be used to steal your
usernames, passwords or other information, which is then forwarded to a third
party.

‘Malware’ is a catch all term to describe different types of malware which include
viruses, worms, spyware, trojans or bots. Digitpol's specialized Malware and Virus
analysis team trace malware, detect and remove threats and analyze the function and
trace data transfer routes.

What is Sophisticated attacks Investigation? 


Sophisticated criminals are active daily to exploit vulnerabilities on computers
and other devices. Some of the techniques they use include:

 unauthorised access or hacking – when someone gains access to your


computer or device without permission,
 malware – malicious software (such as viruses, trojans and spyware)
which monitor your online activity and cause damage to the computer,
 denial of service attacks – an attack which floods a computer or website
with data, causing it to overload and prevent it from functioning properly.
This type of attack is more frequently targeted at businesses, rather than
individuals.

DDOS - Denial of service or distributed denial of service attacks Investigation


Cyber attacks are common and often a method seen is a denial of service attack which
floods a computer or website with data, which can overload the system or computer
and prevent it from functioning properly. Unlike hacking or malware, it generally doesn’t
involve access to the computer system. A distributed denial of service (DDoS) attack is
a denial of service attack that comes from multiple systems, often a network of
compromised computers.

Email Fraud Investigation
Digitpol's Cyber and Fraud Team are certified fraud and forensic examiners and can
deploy to assist with all cases related to email fraud, email spear phishing attacks,
email scams and on-line related fraud. Digitpol can deploy forensic examiners to
investigate hacking, determine how it took place and report the findings, Digitpol
ensures that hackers are not active in your network and ensure your user accounts
policies and rules are configured correctly to prevent further attacks.

Phishing Attack Investigation


Phishing attacks, email fraud, scams, online fraud happens in most cases when cyber
criminals find ways to hack into the email servers or accounts of small and medium
companies, often targeting those with business in Asia countries. Cyber criminals gain
access to email accounts and  search through email accounts looking for sensitive
information such as outstanding, unpaid invoices or data relating to financial
transactions and business between supplier, vendor and clients. When cyber criminals
identify a sale or a due invoice, the fraudsters then send various fictitious emails from
the hacked email account or an email address replicated to the original purporting to be
in charge of the sale or due invoice to be paid, the fraudster is then asking for transfers
of funds into a nominated bank account, usually giving an excuse that there is a
problem at the bank and an alternative account needs to be used. It is common that
the nominated account is in the same name as the company name or with a very slight
change such as an extra letter. It is common the bank account to be in the same city as
the victim or client.

Office 365 Phishing Attack Investigation


Digitpol's Cyber and Fraud Team are certified examiners and can assist to all cases
related to Phishing attacks, email scams and fraud. Digitpol can deploy forensic
examiners to investigate the hack, determine how it took place and report the findings,
Digitpol ensures that hackers are not active in your network and ensure your user
accounts policies and rules are configured correctly to prevent further attacks.

If your company has been targeted by a phishing attack such as Internet Fraud, CEO
Fraud or Email Fraud and Scams and funds have been transferred to a bank account,
we can help you, but only if you act fast and if you have the proof. If Digitpol is notified
in time, Digitpol will assist to stop the funds from been transferred further and assist
with all matters such as reporting the crime to the local Police in the region the funds
have been transferred to.

Hacked Websites
Website Shops, websites, woocommerce and hosting platform hacking attacks are on
the rise, spear phishing and social engineering methods are used to steal email
account user data, including login credentials. when such hacking occurs, hackers
have total control over a website, its client list and the woocommerce, data such as
customer information, credit cards, address, IP are all at stake. Often hackers sell the
data on the darkweb or blackmail the client list.

Digitpol's Cyber and Fraud Team are certified examiners and can assist to all cases
related to website hacking, cyber attacks, hacked woocommerce, hacked hosting or
email accounts. Digitpol can deploy forensic examiners to investigate the hack,
determine how it took place and report the findings, Digitpol ensures that hackers are
not active in your network and ensure your user accounts policies and rules are
configured correctly to prevent further attacks

Read more!

Cyber Crime : https://www.attorneys.com/consumer-law-and-


protection/questions-and-answers-about-computer-crimes

https://digitpol.com/cybercrimeinvestigation/#:~:text=The%20aim%20of%20a
%20cyber%20crime%20investigation%20is,a%20crime%2C%20or%20it%20may
%20be%20the%20

ONLINE DISCUSSION

Attend to our online discussion and interact with me and with


your fellow classmates. You can raise your questions and
clarification, as well as share your ideas and thoughts with the
class. Be sure to go online (schedule)
APPLICATION

TASK 2: BOOKMARK GENERALIZATION


 Upon learning about the Concept Cyber Crime Investigation, write your
generalizations learned in the discussion in the bookmark below. Follow the
guide questions.

Guide Questions:
1. Explain what are the
types of cyber
crimes ;
2. Give one (1)
example each of the
types and explain
why it belongs there.

TASK 3: ESSAY
1. How important in knowing the nature and concept of cyber crime?
Expound your answer.
2. As a students, how are you going to impart your knowledge to your peers
with regards to Cyber crime? Explain.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy