Prezentace aplikace PowerPoint

Transcription

Prezentace aplikace PowerPoint
Faculty of Security Management of the Police Academy of
the Czech Republic in Prague
A Some Aspects of the Cyber Crime committed
on Children
October 9, 2014
Assoc. Prof. Dr. Josef Požár, Ph.D. – Dean
1
1
Cyber world and security
Cyber world:
Internet and computers, mobile phomes,
service and nets, game console, media
carrying information and datea
Security:
• Computer – computer protection of data,
information (security programs and
systems – antiviruses, firewalls,
passwords…)
• Personal – the proniples and rules of
safe use of IT - netikets (net + ethics)
2
Statistics
• 93% of children use a computer and phone
• 8 out of 10 teenagers have a home computer,
mobile phone and games console
• 1,400,000 UK pupils have their own web
space
• There are over 200 million registered users of
MySpace
• The number of text messages sent every day
exceeds the total population of the planet
3
Users of social networks in Czech
republic
• Facebook: ČR = 3,8 mil. / World = 1+
miliarda,
• Twitter: ČR = 150 tis. / World = 200 mil.,
• Google+: ČR = 400 tis. / World = 400 mil.,
• LinkedIn: ČR = 242 tis. / World = 200 mil.
• Lidé.cz = 880 tis., Spolužáci.cz = 628 tis.,
Libimseti.cz = 304 tis.
• Other interesting social networks in the
World:
Instagram = 100 mil., Pinterest = 40 mil.,
Foursquare = 30 mil.
Sourse: 2013
http://www.doba-webova.com/cs/statistiky-pro-socialni-sit
4
http://www.doba-webova.com/cs/statistiky-pro-socialni-sit
5
Keeping Personal Information Private
Who is looking at you online?
66
The Internet
• Pro’s
• Large volume of
Info.
• Easy access
• Widely accepted
• Taught in early ages
• Con’s
• Large pool of
Victims
• No regulation
• Kid appeal
• Not supervised
7
7
The Internet can be used to…..
•
•
•
•
•
•
•
Commit Murder
Commit Fraud
Communicate Threats
Commit Harassment
Commit Arson
Commit Theft of Information
Molest, abuse, and exploit CHILDREN!!!
8
Research on youth in the USA
cybercrime (470 crimes)
•
•
•
•
•
•
•
•
•
•
Aggravated Harassment
Grand Larceny
Hacking
Forgery
Petit Larceny
Criminal Impersonation
Child Pornography
Crimes Against Children
Scheme to Defraud
Other Crimes
42.8%
21.7%
9.8%
4.9%
4.7%
4.3%
4.0%
3.0%
2.1%
2.8%
9
Who are the perpetrators?
• 24% of sexual solicitations are from adults
• 34% of AGGRESSIVE solicitations are from
adults
• 4% of all solicitors are over 25 years old
(most adults are 18-25)
• 48% of solicitors are juveniles
• Over 2/3 of solicitors are males
• 25% of aggressive solicitors were female
Source: National Center for Missing & Exploited Children-June 2010
10
Cyberbullying
11
Cyberbullying in Czech republic
• 4.2 million people in the Czech Republic has
its own profile, or using FACEBOOK. Of that
17% of young people, i.e.. 714 000.
(September 2014)
• The exploration of Gender: men are more at
risk from cyber-bullying than women. For
Example. Identity theft – men (51%), only
women 37%. (Novinky.cz 3.10.2014).
• New USB virus – badUSB – focused on the
USB controller, which is located on the base.
the plate and the latter is not protected.
12
Forma kyberšikany
Ti, kteří byli kyberšikanováni v posledních 6 měsících, N=102
denně
SMS, nebo MMS
chatroom, ICQ, AOL
(instant messaging)
2% 6%
3% 7%
32%
17%
70%
18%
71%
86%
89%
4% 5%
91%
4%
94%
3%2%
95%
0%
10%
ne
48%
4% 5%
virtuální svět (např. Second Life
- interaktivní hra pro více hráčů)
lživá, hanlivá webová stránka
vytvořená ke konkrétní osobě
méně často
2% 4% 8%
online video, fotky
blog
alespoň 1x týdně
12%
3% 9%
e-mail
sociální sítě - komunity
(např. Facebook, Lide.cz apod.)
několikrát týdně
20%
30%
40%
50%
60%
70%
80%
90%
100%
13
How are children affected?
• 75% of youth reported little or no effect
• 20% were very or extremely upset (this was
true in 13% of aggressive incidents)
• 17% were very or extremely embarrassed
(this was true in 32% of aggressive incidents)
• 17% of youth who were solicited showed 5 or
more symptoms of depression (2 times the
overall sample)
Source: National Center for Missing & Exploited Children-June 2000
14
How do the predators attack?
• Enter chat rooms meant for use by teens
or children.
• Invite a target child to a private chat (they
listen to the child finding out how to
exploit them).
• They began to slowly turn the
conversation to sexually related material.
• Will coerce more explicit behavior or a
meeting by threatening to tell family or
friends what they’ve been chatting about.
15
Actions
Emerging
Fear
Media
Hype
Now:
understanding
evaluating
responses
practical steps
MSN, websites, videoclips, social networking,
outweigh emails and texts as ‘most hurtful’.
Principles of bullying the same, but new tools
- greater power, secrecy and reach –
humiliate .
16
Indirect Bullying
• Physical
getting another person to assault
someone
• Verbal
spreading rumors
• Non-Verbal
deliberate exclusion from a group
or activity; cyber-bullying
17
ASSESSMENT TREE
{‘PEAS’ PROGRAM}
Cyber Bully Incident Report
Complete report & collect evidence
Assessment
Domains
Family
School
Social
Multiple Factors
Risk vs. Resiliency
Informants
Parents
Teachers
Students
Administrators
Methods
Interview
Collateral info
Assess. Forms
Standardized Instr.
(SAVRY)
Dispositions
Contacts
Parents
Administration
Police
Disciplinary
Detention
Suspension
Expulsion
Arrest
Therapeutic
PEAS Program
Family Support Ctr.
Outside Counseling
Residential Treatment
Ongoing Prevention
18
How do you get your data?
19
Trends of the cyber crime
• 73% of Czechs are afraid of rising cyberattacks on mobile devices and the Internet.
• The attacks on the rise, the data that is in the
cloud.
• Financially motivated threats.
• Malware aimed at the Android OS.
• Increasing specialized and more malware.
• Mobile applications and social networking
will be at more risk.
• Malicious SOFTWARE will infect the
mechanisms of protection.
20
• Increasing the number of 64-bit malware.
• Increasing the exploid kits for Windows.
• Continuing low-level attacks on HW,
critical infrastructure.
• Attack by hackers.
21
Final recommendations
• Comprehensively strengthen, educate and
train specialized police teams involved in the
investigation of cyber crime.
• Intensify international cooperation of police
forces.
• To harmonize legal standards from the
international point of view.
• The unity of the EU legislation. Build
computer teams coordinating emergency
response to cyber incidents (National Security
Agency, the NSA).
22
• A new species and ways to commit cybercrime.
• The need for training of users and managers of
the organization.
• Education vers. attacks the "human factor" from
inside the organization.
23
[email protected]
24