CRM 200 Lecture Notes - Lecture 11: Malware, Cybercrime, Cloud Computing

38 views5 pages
Proposals for Reform
Cyber crime
Cyber space synonym for Internet but meaning is much broader
o new social spaces that are accessible through Internet
Cyber space prone to same hazards, risks, annoyances found in real space, as well as lack of jurisdictional
boundaries, physical constraints, feature of anonymity
Cyber space contains all of same problems that plague real space as well as new ones:
Some businesses and individuals steal intellectual property plus other goods and services on Internet
Others disseminate malware, deface websites, destroy data files
Production, distribution of child pornography, luring of children for sexual encounters, commit fraud,
extortion
Bullies, stalkers can also use Internet as outlet for expression for negative opinions, bullying,
harassment
Criminals able to defy
jurisdictional constraints
Criminals able to defy conventional jurisdictional constraints, weave attacks through multiple jurisdictions
Constraints that govern physical interactions do not apply to cyber space
In cyber space no requirement for physical proximity to commit crime
Conduct illegal, unethical in one jurisdiction may be considered legal in another
Cyber space allows individuals to conceal their identities in ways not possible in real, physical world
Cyber criminals attention:
Cyber attacks impact mainstream computing devices such as laptop and desktop computers
o attractive to attackers due to their prevalence and popularity
Cyber criminals likely to turn attention toward non-mainstream platforms in future, especially if lucrative
rewards
As email security improves, attackers will turn to more sophisticated platforms,
o such as web browsers; data hiding through encryption attractive to criminals
Cloud computing
o information stored, delivered through data centres, owned and maintained by third party may be
targeted
Complexity of security increases with remote storage
Cyber criminals may also turn attention to virtual assets used online,
o if they have real world value, can be sold online;
o virtual currency can be used for money laundering
Malware
o increasingly serious threat, significant money in issue
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows pages 1-2 of the document.
Unlock all 5 pages and 3 million more documents.

Already have an account? Log in
With more and more people conducting business, social transactions online, malicious code moving away
from being harmful to financial benefit
Rapid growth to e-commerce, virtual currency, underground economy on Internet
Terror organizations capable of inflicting serious harm on communications infrastructure
o important to put in place measures to protect against risk, mitigate harms suffered when attacks made
Internet extremely important element in today’s society
Communications technologies accessible to millions of people around the world
Canada “far behind” other leading industrialized countries in confronting computer crime through legislation
o only recently that laws enacted against spam, identity theft and phishing
Solutions: Legislation and
educating
Legislation is only part of solution user education, accountability also critical
Individual users need to be encouraged to be more responsible and proactive
Public awareness should be facilitated at all levels of community
o educating young children about online communications with strangers, risks of online commerce
Increase public awareness of existing cyber reporting mechanisms
Canada needs to facilitate inter-jurisdictional, inter-agency cooperation in fight against cyber crime
Need for providing necessary resources for law enforcement agencies, central reporting stations
Technological assistance needed for national, provincial, municipal police
Facilitate relationships between investigative agencies and private sector
Since many attacks motivated by profit, mechanism to limit or reduce attacker’s ability to profit likely
to be workable solution to combat cyber threats
However, many cyber crimes committed internationally, so also important for further international
cooperation, partnership with other nations
Need for international treaties, implementation of lawful access legislation in Canada
Without lawful access legislation, no way for Canada to intercept online communications of cyber crime
suspects, request and receive valuable information about suspects, gather physical evidence needed for
prosecution
By implementing such measures, Canada would achieve greater success in fight against cyber criminals,
become global leader in worldwide effort to combat crime on Internet
Questions:
What is future of cyber crime?
What can Parliament do to respond to developments in computer related crime?
What are some of most problematic issues and what can be done to lessen their impact?
Is the Canadian legal framework capable of dealing with more advanced security threats?
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows pages 1-2 of the document.
Unlock all 5 pages and 3 million more documents.

Already have an account? Log in

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents