1&1 Hosting Special


Friday, November 6, 2009

Cyber Crime Statistics


The following cyber crime statistics illustrate of some of the general trends in the field of hi-tech crimes. Marked increases in cyber crime statistics result in an increasing need for professionals capable of responding to and investigating cyber crimes, and conducting computer forensic examinations of evidence in these cases.



Cyber Crime Statistics from the 2006 Internet Crime Report*


In 2006, the Internet Crime Complaint Center received and processed over 200,000 complaints.


More than 86,000 of these complaints were processed and referred to various local, state, and federal law enforcement agencies.


Most of these were consumers and persons filing as private persons.


Total alleged dollar losses were more than $194 million.


Email and websites were the two primary mechanisms for fraud.


Although the total number of complaints decreased by approximately 7,000 complaints from 2005, the total dollar losses increased by $15 million.


The top frauds reported were auction fraud, non-delivery of items, check fraud, and credit card fraud.


Top contact mechanisms for perpetrators to victims were email (74%), web page (36%), and phone (18%) (there was some overlap).


* The Internet Crime Complaint Center is a clearinghouse for online economic crime complaints. It is maintained by the National White Collar Crime Center and the Federal Bureau of Investigations. To review the results of the study, visit the National White Collar Crime Center’s site, at http://www.ic3.gov/media/annualreport/2006_IC3Report.pdf .


Cyber Crime Statistics from the 12th Annual Computer Crime and Security Survey*


Between 2006 and 2007 there was a net increase in IT budget spent on security.


Significantly, however, the percentage of IT budget spent on security awareness training was very low, with 71% of respondents saying less than 5% of the security budget was spent on awareness training, 22% saying less than 1% was spent on such training.



71% of respondents said their company has no external insurance to cover computer security incident losses.


90% of respondents said their company experienced a computer security incident in the past 12 months.


64% of losses were due to the actions of insiders at the company.


The top 3 types of attack, ranked by dollar losses, were:


financial fraud ($21.1 million)


viruses/worms/trojans ($8.4 million)


system penetration by outsiders ($6.8 million)


* The complete results of this study, as well as past studies, which are conducted annually by the Computer Security Institute, can be found at the CSI website www.gocsi.com . Interestingly, these statistics are compiled from voluntary responses of computer security professionals. Thus, there is certainly an inference that the damages due to computer security incidents are much higher than those cited here, as companies without responding security professionals undoubtedly were the victim of computer security incidents.


Cyber Crime Statistics from the Online Victimization of Youth, Five Years Later study*


Increasing numbers of children are being exposed to unwanted sexual materials online.


Reports of online sexual solicitations of youth decreased while reports of aggressive sexual solicitation of youth did not (perhaps indicating that some prevention and education measures may be working, while the most serious offenders may not be deterred).


Online child solicitation offenses are rarely reported to any authority.


Incidents of online harassment and bullying increased.


*This is an empirical study based on approximately 1500 surveys conducted with online youth in 2005 that were compared to the results of a similar study in 2001. The study was conducted by the National Center for Missing and Exploited Children, the Crimes Against Children Research Center, and the Office for Juvenile Justice and Delinquency Prevention at the United States Department of Justice. The complete results of the study can be found here http://www.missingkids.com/en_US/publications/NC167.pdf .

No comments: