You are on page 1of 13

Master of Informatic Slide Presentation Check Point 1

1 BY LARRY BULLARD THESIS PROJECT NUMBER

Law, Internet, Security, and Technology (LIST)


2 ADDRESSING THE CYBER-SECURITY INTERNET CRISES

What is a cyber crime?


Loosely used definition: Criminal activity in which a

computer or network is used for or directed at a target in a criminal way. Cyber-crime: An illegal act involving a computer or its system components, hardware, firmware, or any applications of software with a criminal intent.

The Rule of Law in this definition


Loosely stated: In order for an activity to be

considered criminal, the activity must not be unintentional and nor accidental. To guard against any misunderstanding regarding testing a computer system, get written permission from an authorized authority.

Some Types of Computer Crimes


Internet Extortion

Infecting computer or systems with Viruses


Credit Card Fraud Computer and system Hacking

Use of Computer for drug trafficking


Software Piracy Theft of Intellectual Property

Some Methods of Attacks


Distributive Denial of Service

Spoofing internet packets


False handshaking being computers or systems

(improper communication)E Password Cracking Cookie, email headers, browser, ect. injections Trojan Horse Buffer Overflow

Methods and Tools for Prevention and Determination of a Cyber Attack


Intrusion Detection Systems (IDS)

Intrusion Prevention Systems (IPS)


Firewalls

Types of Intrusion Detection Systems


Intrusion Detection software for Host

Intrusion Detection software for systems (network

system) Internal system/network logging programs

Tools Used for Detection and Prevention


Firewall Analyzer

GFI Event Manager


Eventlog Analyzer Wireshark

Encase
Snort

ICT & The Rule of Law


(15) The Diplomatic Conference held under the auspices of the

World Intellectual Property Organisation (WIPO) in December 1996 led to the adoption of two new Treaties, the 'WIPO Copyright Treaty' and the 'WIPO Performances and Phonograms Treaty', dealing respectively with the protection of authors and the protection of performers and phonogram producers. Those Treaties update the international protection for copyright and related rights significantly, not least with regard to the so-called 'digital agenda', and improve the means to fight piracy world-wide. The Community and a majority of Member States have already signed the Treaties and the process of making arrangements for the ratification of the Treaties by the Community and the Member States is under way. This Directive also serves to implement a number of the new international obligations2.

A Specific EU Directive address design importants


(8) The various social, societal and cultural

implications of the information society require that account be taken of the specific features of the content of products and services2.

Quick Reference
1. http://www.bth.se/tek/masters_eng.nsf/pages/informatics

2. EU: Directive 2001/29/EC, Celex No. 301L0029, updated 2010

THE END
SLIDE 2 WILL HAVE MORE DETAIL

You might also like