2. In the digital world we live in, crime hasIn the digital world we live in, crime has
taken on a whole new dimensiontaken on a whole new dimension
3. In the digital world we live in, crime hasIn the digital world we live in, crime has
taken on a whole new dimensiontaken on a whole new dimension
Crime has migrated into the fields ofCrime has migrated into the fields of
information and data. And theinformation and data. And the
computer has become a new tool forcomputer has become a new tool for
stealing.stealing.
4. In the digital world we live in, crime hasIn the digital world we live in, crime has
taken on a whole new dimensiontaken on a whole new dimension
Crime has migrated into the fields ofCrime has migrated into the fields of
information and data. And theinformation and data. And the
computer has become a new tool forcomputer has become a new tool for
stealing.stealing.
With this change has come a new wayWith this change has come a new way
of fighting crimeof fighting crime
5. In the digital world we live in, crime hasIn the digital world we live in, crime has
taken on a whole new dimensiontaken on a whole new dimension
Crime has migrated into the fields ofCrime has migrated into the fields of
information and data. And theinformation and data. And the
computer has become a new tool forcomputer has become a new tool for
stealing.stealing.
With this change has come a new wayWith this change has come a new way
of fighting crimeof fighting crime
Learn more about cyber crimeLearn more about cyber crime
investigation here...investigation here...
8. Technopedia’sTechnopedia’s definition
of cybercrime is “crime
in which a computer is
the object of the crime...
or is used as a tool to
commit an offence”
A cyber crime can thusA cyber crime can thus
either be a crime whereeither be a crime where
the computer is thethe computer is the
target -target - tthis is usually the
case when someone
hacks into a system or
uses spyware to steal
information
9. Or it can be a crimeOr it can be a crime
committed through thecommitted through the
use of a computer. Thisuse of a computer. This
can be anything fromcan be anything from
planning a terroristplanning a terrorist
attack to committingattack to committing
online fraud.online fraud.
11. There is a long list ofThere is a long list of
identified cyber crimes.identified cyber crimes.
This includes:This includes:
12. There is a long list ofThere is a long list of
identified cyber crimes.identified cyber crimes.
This includes:This includes:
•Identity theftIdentity theft
•Stealing of privateStealing of private
informationinformation
•Corporate fraudCorporate fraud
•HackingHacking
•Child pornographyChild pornography
•Stock market manipulationStock market manipulation
•Theft of intellectualTheft of intellectual
propertyproperty
•PhishingPhishing
•Cyber terrorismCyber terrorism
•Cyber attacksCyber attacks
13. All these crimes haveAll these crimes have
different legal penalties.different legal penalties.
Some will earn you aSome will earn you a
simple fine, while otherssimple fine, while others
will earn you a hefty jailwill earn you a hefty jail
sentence.sentence.
15. Cyber crimeCyber crime
investigation is a lot likeinvestigation is a lot like
regular crimeregular crime
investigation, exceptinvestigation, except
that investigators usethat investigators use
computers ascomputers as
investigation tools andinvestigation tools and
data as sources ofdata as sources of
evidence.evidence.
16. Cyber crimeCyber crime
investigation is a lot likeinvestigation is a lot like
regular crimeregular crime
investigation, exceptinvestigation, except
that investigators usethat investigators use
computers ascomputers as
investigation tools andinvestigation tools and
data as sources ofdata as sources of
evidence.evidence.
It is, however, very difficultIt is, however, very difficult
to catch a cyber criminalto catch a cyber criminal
since they can commitsince they can commit
crimes remotely andcrimes remotely and
anonymouslyanonymously..
17. Cyber crimeCyber crime
investigation hasinvestigation has
consequently becomeconsequently become
a highly specialiseda highly specialised
professional field.professional field.
18. What does aWhat does a
Cyber CrimeCyber Crime
InvestigatorInvestigator
dodo??
19. A cyber crimeA cyber crime
investigator can have ainvestigator can have a
number of jobs, such as:number of jobs, such as:
20. A cyber crimeA cyber crime
investigator can have ainvestigator can have a
number of jobs, such as:number of jobs, such as:
•Recovering files fromRecovering files from
computers and devices tocomputers and devices to
use as evidence in ause as evidence in a
criminal casecriminal case
•Investigating corporateInvestigating corporate
fraud through examiningfraud through examining
business computer filesbusiness computer files
•Testing network securityTesting network security
systems for corporationssystems for corporations
•Investigating childInvestigating child
exploitation, cyber stalking,exploitation, cyber stalking,
or attempted fraud.or attempted fraud.
21. There are a number ofThere are a number of
different job titles, suchdifferent job titles, such
as Computer Forensicas Computer Forensic
Expert or a ComputerExpert or a Computer
Examiner.Examiner.
Each title or position inEach title or position in
the field of cyber crimethe field of cyber crime
investigation will have itsinvestigation will have its
own duties andown duties and
specialisations.specialisations.
23. They can work asThey can work as
private investigators orprivate investigators or
security contractors forsecurity contractors for
corporations andcorporations and
clients.clients.
24. They can work asThey can work as
private investigators orprivate investigators or
security contractors forsecurity contractors for
corporations andcorporations and
clients.clients.
Or they can work in lawOr they can work in law
enforcement and beenforcement and be
part of a forensics orpart of a forensics or
cyber crimecyber crime
department or unit.department or unit.
25. One of the biggestOne of the biggest
cyber crimecyber crime
investigationinvestigation
organisations is in factorganisations is in fact
the FBI:the FBI:
““We lead the nationalWe lead the national
effort to investigateeffort to investigate
high-tech crimes,high-tech crimes,
including cyber-basedincluding cyber-based
terrorism, espionage,terrorism, espionage,
computer intrusions,computer intrusions,
and major cyber fraud.”and major cyber fraud.”
– FBI– FBI
26. How can youHow can you
become abecome a
Cyber CrimeCyber Crime
Investigator?Investigator?
27. Because this is a highlyBecause this is a highly
specialised field, youspecialised field, you
will need to get uniquewill need to get unique
trainingtraining
28. Because this is a highlyBecause this is a highly
specialised field, youspecialised field, you
will need to get uniquewill need to get unique
trainingtraining
You can kickstart yourYou can kickstart your
career by taking one ofcareer by taking one of
Skills Academy’s Cyber Crime Investigation CoursesSkills Academy’s Cyber Crime Investigation Courses
29. You can complete anyYou can complete any
of these courses throughof these courses through
distance learning. Thisdistance learning. This
means you study frommeans you study from
home in your sparehome in your spare
time.time.
30. To find out more about our CyberTo find out more about our Cyber
Crime Investigation CoursesCrime Investigation Courses
you can call us onyou can call us on
31. To find out more about our CyberTo find out more about our Cyber
Crime Investigation CoursesCrime Investigation Courses
you can call us onyou can call us on
0800 040 0400800 040 040
32. To find out more about our CyberTo find out more about our Cyber
Crime Investigation CoursesCrime Investigation Courses
you can call us onyou can call us on
0800 040 0400800 040 040
And talk to one of our Student RegistrarsAnd talk to one of our Student Registrars