CRM 200 Lecture Notes - Lecture 11: Malware, Cybercrime, Cloud Computing
![](https://new-preview-html.oneclass.com/Yaxkv7zyB48qN4bannw8m20dL5M6XOgn/bg1.png)
Proposals for Reform
Cyber crime
• Cyber space synonym for Internet but meaning is much broader
o new social spaces that are accessible through Internet
• Cyber space prone to same hazards, risks, annoyances found in real space, as well as lack of jurisdictional
boundaries, physical constraints, feature of anonymity
• Cyber space contains all of same problems that plague real space as well as new ones:
– Some businesses and individuals steal intellectual property plus other goods and services on Internet
– Others disseminate malware, deface websites, destroy data files
– Production, distribution of child pornography, luring of children for sexual encounters, commit fraud,
extortion
– Bullies, stalkers can also use Internet as outlet for expression for negative opinions, bullying,
harassment
Criminals able to defy
jurisdictional constraints
• Criminals able to defy conventional jurisdictional constraints, weave attacks through multiple jurisdictions
• Constraints that govern physical interactions do not apply to cyber space
• In cyber space no requirement for physical proximity to commit crime
• Conduct illegal, unethical in one jurisdiction may be considered legal in another
• Cyber space allows individuals to conceal their identities in ways not possible in real, physical world
Cyber criminals attention:
• Cyber attacks impact mainstream computing devices such as laptop and desktop computers
o attractive to attackers due to their prevalence and popularity
• Cyber criminals likely to turn attention toward non-mainstream platforms in future, especially if lucrative
rewards
• As email security improves, attackers will turn to more sophisticated platforms,
o such as web browsers; data hiding through encryption attractive to criminals
• Cloud computing
o information stored, delivered through data centres, owned and maintained by third party may be
targeted
• Complexity of security increases with remote storage
• Cyber criminals may also turn attention to virtual assets used online,
o if they have real world value, can be sold online;
o virtual currency can be used for money laundering
• Malware
o increasingly serious threat, significant money in issue
find more resources at oneclass.com
find more resources at oneclass.com
![](https://new-preview-html.oneclass.com/Yaxkv7zyB48qN4bannw8m20dL5M6XOgn/bg2.png)
• With more and more people conducting business, social transactions online, malicious code moving away
from being harmful to financial benefit
• Rapid growth to e-commerce, virtual currency, underground economy on Internet
• Terror organizations capable of inflicting serious harm on communications infrastructure
o important to put in place measures to protect against risk, mitigate harms suffered when attacks made
• Internet extremely important element in today’s society
• Communications technologies accessible to millions of people around the world
• Canada “far behind” other leading industrialized countries in confronting computer crime through legislation
o only recently that laws enacted against spam, identity theft and phishing
Solutions: Legislation and
educating
• Legislation is only part of solution – user education, accountability also critical
• Individual users need to be encouraged to be more responsible and proactive
• Public awareness should be facilitated at all levels of community
o educating young children about online communications with strangers, risks of online commerce
• Increase public awareness of existing cyber reporting mechanisms
• Canada needs to facilitate inter-jurisdictional, inter-agency cooperation in fight against cyber crime
• Need for providing necessary resources for law enforcement agencies, central reporting stations
• Technological assistance needed for national, provincial, municipal police
• Facilitate relationships between investigative agencies and private sector
• Since many attacks motivated by profit, mechanism to limit or reduce attacker’s ability to profit likely
to be workable solution to combat cyber threats
• However, many cyber crimes committed internationally, so also important for further international
cooperation, partnership with other nations
• Need for international treaties, implementation of lawful access legislation in Canada
• Without lawful access legislation, no way for Canada to intercept online communications of cyber crime
suspects, request and receive valuable information about suspects, gather physical evidence needed for
prosecution
• By implementing such measures, Canada would achieve greater success in fight against cyber criminals,
become global leader in worldwide effort to combat crime on Internet
Questions:
• What is future of cyber crime?
• What can Parliament do to respond to developments in computer related crime?
• What are some of most problematic issues and what can be done to lessen their impact?
• Is the Canadian legal framework capable of dealing with more advanced security threats?
find more resources at oneclass.com
find more resources at oneclass.com