Prezentace aplikace PowerPoint
Transcription
Prezentace aplikace PowerPoint
Faculty of Security Management of the Police Academy of the Czech Republic in Prague A Some Aspects of the Cyber Crime committed on Children October 9, 2014 Assoc. Prof. Dr. Josef Požár, Ph.D. – Dean 1 1 Cyber world and security Cyber world: Internet and computers, mobile phomes, service and nets, game console, media carrying information and datea Security: • Computer – computer protection of data, information (security programs and systems – antiviruses, firewalls, passwords…) • Personal – the proniples and rules of safe use of IT - netikets (net + ethics) 2 Statistics • 93% of children use a computer and phone • 8 out of 10 teenagers have a home computer, mobile phone and games console • 1,400,000 UK pupils have their own web space • There are over 200 million registered users of MySpace • The number of text messages sent every day exceeds the total population of the planet 3 Users of social networks in Czech republic • Facebook: ČR = 3,8 mil. / World = 1+ miliarda, • Twitter: ČR = 150 tis. / World = 200 mil., • Google+: ČR = 400 tis. / World = 400 mil., • LinkedIn: ČR = 242 tis. / World = 200 mil. • Lidé.cz = 880 tis., Spolužáci.cz = 628 tis., Libimseti.cz = 304 tis. • Other interesting social networks in the World: Instagram = 100 mil., Pinterest = 40 mil., Foursquare = 30 mil. Sourse: 2013 http://www.doba-webova.com/cs/statistiky-pro-socialni-sit 4 http://www.doba-webova.com/cs/statistiky-pro-socialni-sit 5 Keeping Personal Information Private Who is looking at you online? 66 The Internet • Pro’s • Large volume of Info. • Easy access • Widely accepted • Taught in early ages • Con’s • Large pool of Victims • No regulation • Kid appeal • Not supervised 7 7 The Internet can be used to….. • • • • • • • Commit Murder Commit Fraud Communicate Threats Commit Harassment Commit Arson Commit Theft of Information Molest, abuse, and exploit CHILDREN!!! 8 Research on youth in the USA cybercrime (470 crimes) • • • • • • • • • • Aggravated Harassment Grand Larceny Hacking Forgery Petit Larceny Criminal Impersonation Child Pornography Crimes Against Children Scheme to Defraud Other Crimes 42.8% 21.7% 9.8% 4.9% 4.7% 4.3% 4.0% 3.0% 2.1% 2.8% 9 Who are the perpetrators? • 24% of sexual solicitations are from adults • 34% of AGGRESSIVE solicitations are from adults • 4% of all solicitors are over 25 years old (most adults are 18-25) • 48% of solicitors are juveniles • Over 2/3 of solicitors are males • 25% of aggressive solicitors were female Source: National Center for Missing & Exploited Children-June 2010 10 Cyberbullying 11 Cyberbullying in Czech republic • 4.2 million people in the Czech Republic has its own profile, or using FACEBOOK. Of that 17% of young people, i.e.. 714 000. (September 2014) • The exploration of Gender: men are more at risk from cyber-bullying than women. For Example. Identity theft – men (51%), only women 37%. (Novinky.cz 3.10.2014). • New USB virus – badUSB – focused on the USB controller, which is located on the base. the plate and the latter is not protected. 12 Forma kyberšikany Ti, kteří byli kyberšikanováni v posledních 6 měsících, N=102 denně SMS, nebo MMS chatroom, ICQ, AOL (instant messaging) 2% 6% 3% 7% 32% 17% 70% 18% 71% 86% 89% 4% 5% 91% 4% 94% 3%2% 95% 0% 10% ne 48% 4% 5% virtuální svět (např. Second Life - interaktivní hra pro více hráčů) lživá, hanlivá webová stránka vytvořená ke konkrétní osobě méně často 2% 4% 8% online video, fotky blog alespoň 1x týdně 12% 3% 9% e-mail sociální sítě - komunity (např. Facebook, Lide.cz apod.) několikrát týdně 20% 30% 40% 50% 60% 70% 80% 90% 100% 13 How are children affected? • 75% of youth reported little or no effect • 20% were very or extremely upset (this was true in 13% of aggressive incidents) • 17% were very or extremely embarrassed (this was true in 32% of aggressive incidents) • 17% of youth who were solicited showed 5 or more symptoms of depression (2 times the overall sample) Source: National Center for Missing & Exploited Children-June 2000 14 How do the predators attack? • Enter chat rooms meant for use by teens or children. • Invite a target child to a private chat (they listen to the child finding out how to exploit them). • They began to slowly turn the conversation to sexually related material. • Will coerce more explicit behavior or a meeting by threatening to tell family or friends what they’ve been chatting about. 15 Actions Emerging Fear Media Hype Now: understanding evaluating responses practical steps MSN, websites, videoclips, social networking, outweigh emails and texts as ‘most hurtful’. Principles of bullying the same, but new tools - greater power, secrecy and reach – humiliate . 16 Indirect Bullying • Physical getting another person to assault someone • Verbal spreading rumors • Non-Verbal deliberate exclusion from a group or activity; cyber-bullying 17 ASSESSMENT TREE {‘PEAS’ PROGRAM} Cyber Bully Incident Report Complete report & collect evidence Assessment Domains Family School Social Multiple Factors Risk vs. Resiliency Informants Parents Teachers Students Administrators Methods Interview Collateral info Assess. Forms Standardized Instr. (SAVRY) Dispositions Contacts Parents Administration Police Disciplinary Detention Suspension Expulsion Arrest Therapeutic PEAS Program Family Support Ctr. Outside Counseling Residential Treatment Ongoing Prevention 18 How do you get your data? 19 Trends of the cyber crime • 73% of Czechs are afraid of rising cyberattacks on mobile devices and the Internet. • The attacks on the rise, the data that is in the cloud. • Financially motivated threats. • Malware aimed at the Android OS. • Increasing specialized and more malware. • Mobile applications and social networking will be at more risk. • Malicious SOFTWARE will infect the mechanisms of protection. 20 • Increasing the number of 64-bit malware. • Increasing the exploid kits for Windows. • Continuing low-level attacks on HW, critical infrastructure. • Attack by hackers. 21 Final recommendations • Comprehensively strengthen, educate and train specialized police teams involved in the investigation of cyber crime. • Intensify international cooperation of police forces. • To harmonize legal standards from the international point of view. • The unity of the EU legislation. Build computer teams coordinating emergency response to cyber incidents (National Security Agency, the NSA). 22 • A new species and ways to commit cybercrime. • The need for training of users and managers of the organization. • Education vers. attacks the "human factor" from inside the organization. 23 [email protected] 24