The Changing Landscape of Cybercrime: Trends, History, and Ethical Considerations

The Changing Landscape of Cybercrime: Trends, History, and Ethical Considerations
Slide Note
Embed
Share

In the evolving realm of cybercrime, this content delves into the trends, history, and ethics of computer crimes and protection measures. It explores the varying approaches and motivations of cyber attackers while highlighting the role of professionals in security. Are Internet and partner technologies responsible for creating new crimes? Dive into the impact and ethical considerations in information technology.

  • Cybercrime
  • Information Technology
  • Ethics
  • Trends
  • Security

Uploaded on Mar 19, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Introduction Changing landscape of cybercrime Ethics in Information Technology

  2. Outlines Describe trends in computer crimes and protection against viruses and other cybercrimes. Discuss the history of computer crimes. Describe several different cyber- attacker approaches and motivations. Identify the professional s role in security and the tradeoffs involved. Ethics in Information Technology

  3. Introduction In the last two decades, we have witnessed the rapid growth of the Internet, mobile technology and the correspondingly rapid growth of online crimes, or cybercrimes With this growth, there has been a spike in the rate of cybercrimes committed over the Internet Ethics in Information Technology

  4. Are Internet and partner technologies responsible for creating new crimes? Are they the root causes of these crimes? Ethics in Information Technology

  5. Figure 1.1 The Changing Nature of Cybercrimes Computer Network Security and Cyber Ethics,4th ed, Joseph Migga Kizza Ethics in Information Technology

  6. Example (Whiz Kids): A profile of a cyber criminal soon emerged a privately schooled, suburban, highly intelligent, soccer- playing but lonely wolf in thrill- seeking escapades that would lead to bragging rights. The Second Generation (1990 1990- -2000) 2000) Their operations were more or less predictable and, with exception of a few cases, there was a complete lack of organizational structure, something that is significantly noticeable in later generations of attacks. Ethics in Information Technology

  7. As the Computer Science Institute and Federal Bureau of Investigation s (CSI/FBI) 2005 survey results indicate, virus attacks continued as the source of the greatest financial losses Closely behind viruses were unauthorized access, which showed a dramatic cost increase and replaced denial of service as the second most significant contributor to computer crime losses during that period, unauthorized use of computer systems, and Web site incidents The Third Generation (2000 2000- -2010) 2010) Attacks so far in this period were overwhelmingly targeted at financial institutions Ethics in Information Technology

  8. The Fourth Generation (2010-2020) A dramatic change in communication technologies and the nature of the information infrastructure, First, there is a fast rate of convergence of computing and telecommunication coming a lot earlier than has been predicted Second, there is a developing trend in computing and communication devices miniaturization, leading us faster to the long- awaited and often talked about Result in fast growing infrastructure of social networks that are leading us into a new unplanned, unpredictable, and more threatening computing environment This changing nature of information technology against the changing background of user demographics is creating a dynamic mosaic of security threats and problems.

  9. Table 1.1 Changing System Threat Landscape, 2010 Computer Network Security and Cyber Ethics,4th ed, Joseph Migga Kizza Changing system threat landscape Ethics in Information Technology

  10. There are two major trends in this generation of cyber attacks. The cyber criminals are organizing themselves more into criminal enterprise cartels Seeing more state- sponsored hacking activities than ever before. Trends This seems to be a more troubling trend. Ethics in Information Technology

  11. Table 1.2 Change in Types of Attack and Misuse, 19992012 Computer Network Security and Cyber Ethics,4th ed, Joseph Migga Kizza Change in type of attack and misuse Ethics in Information Technology

  12. Evolution of Attacks Most traditional cybercrimes witnessed in the previous two generations are in decline This can be attributed to the continuously changing landscape of cybercrimes Ethics in Information Technology

  13. 1. Make everyone aware of the vulnerability and consequences of a cyberspace attack on their well-being. 2. Ensure that everyone is well equipped to safely deal with a cyber attack in this technology-driven and fast-changing society. 3. Help put in place a set of mechanisms to detect, prevent, and handle any cyber attack. 4. Devise a legal and regulatory framework to handle cyberspace s social consequences. Efforts are Underway Ethics in Information Technology

  14. Efforts are Underway Security awareness Formation of public- private partnerships Cybercrime Taskforces Ethics in Information Technology

  15. REFRENCES Chapter 1 : Computer Network Security and Cyber Ethics,4th ed, Joseph Migga Kizza Ethics in Information Technology

Related


More Related Content