Download - Computer crimes

Transcript
Page 1: Computer crimes

•Living in a Digital World

•Discovering Computers 2010

Page 2: Computer crimes

Why Be Concerned about Network and Internet Security?

A computer system consists not only of software, hardware, data/information, and procedures, but also of people- the users of the computer system.

People can use computer system for both good and bad purposes. Some people use computers for evil activities. A computer crime is generally defined as one that uses computers and software for illegal purposes.

Any illegal act involving a computer generally is referred to as a computer crime.Computer crime encompasses a broad range of

potentially illegal activities.

Page 3: Computer crimes
Page 4: Computer crimes

Perpetrators of Cyber Crime

Perpetrators of cybercrime and other intrusions fall into seven basic categories:hackercrackerscript kiddies corporate spyunethical employee cyberextortionist cyberterrorist

Page 5: Computer crimes

Hackers and CrackersHackers A hacker is a person who breaks into computers and computer

networks, either for profit or motivated by the challenge Hackers do not use the system to steal money or property but they

did create fictitious accounts changed some data files. Some people engage in hacking purely for the challenge codes.

Others do it to steal computer time, to peek at confidential information, or to cause damage.

White hat is a term often used to describe ethical hackers that stay entirely within the law.

They never access a system or network illegally, and they work tirelessly to expose holes in systems with the ultimate goal of fixing flaws and improving security.

White hats may be security professionals, hired by companies to audit network security or test software.

Page 6: Computer crimes

Hackers and Crackers

Crackers Cracking is the act of breaking into other computer systems. This can be done with malicious intent, for financial profit, or for

fun. The opposite of the white hat, a black hat or cracker breaks into

systems illegality for personal gain, vandalism (damage), or bragging rights.

A cracker is a one who uses their proficiency for personal gains outside of the law. EX: stealing data, changing bank accounts, distributing viruses, acts of sabotage and mischief on the internet, and have cost companies millions of dollars. etc.

Page 7: Computer crimes

7Chapter 9 Understanding Computers, 11th Edition

HackingHacking: using a computer to break

into another computer system; the person doing the hacking is a hackerTo steal informationTo sabotage a systemTo hijack PCs to generate spam or host

Web sitesSocial hackingAuthorized hacking

Page 8: Computer crimes

Script kiddie

A script kiddie has the same intent as acracker but does not have the technical skills and knowledge. Script kiddies often use prewritten

hacking and cracking programs to break into computers.

Page 9: Computer crimes

Cyberextortionist

A cyberextortionist is someone who uses e-mail as a vehicle for extortion.These perpetrators send an organization a

threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network — if they are not paid a sum of money.

Page 10: Computer crimes

Cyberterrorist

A cyberterrorist is someone who uses the Internet or network to destroy or damage computers for political reasons.

The cyberterrorist might target the nation’s air traffic control system, electricity-generating companies, or a telecommunications infrastructure.

The term, cyberwarfare, describes an attack whose goal ranges from disabling a government’s computer network to crippl a country. Cyberterrorism and cyberwarfare usually require a team of highly skilled people.

Page 11: Computer crimes
Page 12: Computer crimes
Page 13: Computer crimes
Page 14: Computer crimes

Introduction

Computer viruses and crimes have become today’s headline news

With the increasing use of the Internet, it has become easier for virus to spread

Virus show us loopholes in softwareMost virus are targeted at the MS Windows OS

Page 15: Computer crimes

First Computer VirusThe first virus was made in Lahore,

Pakistan, 1986Two programmers named Basit and Amjad Farooq AlviCalled Brain Virus

Page 16: Computer crimes

Computer Virus A virus is a program that "infects" an executable file. After

infection, the executable file functions in a different way than before: maybe only displaying a benign message on the monitor, maybe deleting some or all files on the user's hard drive, maybe altering data files.

There are two key features of a computer virus: The ability to propagate by attaching itself to executable files (e.g.,

application programs, OS, scripts, boot sector of a hard disk or floppy disk, etc.) Running the executable file may make new copies of the virus.

The virus causes harm only after it has infected an executable file and the executable file is run.

Viruses spread from one computer to another through removable disks like USB, network computers & internet.

If a Virus is found on one computer of the network, then it can easily infect whole network.

Page 17: Computer crimes

Background

There are estimated 30,000 computer viruses in existence

Over 300 new ones are created each month

First virus was created to show loopholes in software

Page 18: Computer crimes

Virus Languages

ANSI COBOL C/C++PascalVBAUnix Shell ScriptsJavaScriptBasically any language that works on the system

that is the target

Page 19: Computer crimes

Symptoms of Virus Attack

Computer runs slower then usual Computer no longer boots up Screen sometimes flicker PC speaker beeps periodically System crashes for no reason Files/directories sometimes disappear Denial of Service (DoS)

Page 20: Computer crimes

Virus through the Internet

Today almost 87% of all viruses are spread through the internet (source: ZDNet)

Transmission time to a new host is relatively low, on the order of hours to days

“Latent virus”

Page 21: Computer crimes

Classifying Virus - General

Virus InformationDiscovery Date:Origin:Length:Type:SubType:Risk Assessment:

Category:

Page 22: Computer crimes

TYPES OF COMPUTER Virus

Basic types of computer viruses areWormTrojan Horse Macro

Page 23: Computer crimes

•Worms

•A worm is a program that copies itself.

•The distinction between a virus and worm, is that a virus never copies itself – a virus is copied only when the infected executable file is run.

•In the pure, original form, a worm neither deleted nor changed files on the victim's computer — the worm simply made multiple copies of itself and sent those copies from the victim's computer, thus clogging(jam) disk drives and the Internet with multiple copies of the worm. Releasing such a worm into the Internet will slow the legitimate traffic on the Internet, as continuously increasing amounts of traffic are mere copies of the worm.

•A classic example of a worm is the ILOVEYOU virus.

Page 24: Computer crimes

Worms

Spread over network connectionWorms replicateFirst worm released on the Internet was called

Morris worm, it was released on Nov 2, 1988.

Page 25: Computer crimes

Trojan Horse

CovertLeaks informationUsually does not reproduce

Page 26: Computer crimes

The TROJAN HORSE Virus

•The Trojan virus once on your computer, doesn't reproduce, but instead makes your

computer susceptible to malicious intruders by allowing them to access and read your files.

Making this type of virus extremely dangerous to your computer's security and your personal

privacy. Therefore, you should avoid downloading programs or files from sites if

you're not 100 percent positive of what the file or program does.

Page 27: Computer crimes

Macro

A macro virus is programmed as a macro embedded in a document. Many applications, such as Microsoft Word and Excel, support macro languages.

Once a macro virus gets on to your computer, every document you produce will become infected.

This type of virus is relatively new and may slip by your antivirus software if you don't have the most recent version installed on your computer.

Page 28: Computer crimes

Boot Sector viruses:

A boot sector virus infects diskettes and hard drives. All disks and hard drives contain smaller sections called sectors. The first sector is called the boot.

The boot carries the Master Boot Record (MBR). MBR functions to read and load the operating system. So, if a virus infects the boot or MBR of a disk, such as a floppy disk, your hard drive can become infected, if you re-boot your computer while the infected disk is in the drive.

Once your hard drive is infected all diskettes that you use in your computer will be infected. Boot sector viruses often spread to other computers by the use of shared infected disks and pirated software applications.

The best way to disinfect your computer of the boot sector virus is by using antivirus software.

Page 29: Computer crimes

Logic & Time Bombs

Logic bombs are programs which start executing malicious program when user performs any specific action in the computer. For Example: In one case, a programmer inserted a logic bomb into a company’s system; that would destroy company’s whole system, if his name was removed from it.

Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.

A time bomb refers to a computer program that has been written so that it will stop functioning after a predetermined date or it will trigger criminal activity at a specified date. For Example:Time bombs are commonly used in shareware (trial) software when the manufacturer of the software does not want the trial version being used after the fix time.

Page 30: Computer crimes

Data Diddling or Data Manipulation

Data diddling or manipulation is the way in which important data can be manipulated and changed. A person can edit the business information of a company or personal information of some other person to harm them. Data diddlersare often found changing grades in the university records, falsifying input records on bank transactions etc.

Page 31: Computer crimes

Data Stealing

This is the type of crime in which the private information is stolen using illegal ways. For Example: Mostly credit cards information is theft by black hats. Passwords can also be stolen through different hacking techniques.

Page 32: Computer crimes

Software Piracy

The unauthorized copying & use of any proprietary software is called Piracy.

Most retail programs are licensed for use at just one computer site or for use by only one user at any time.

By buying the software, you become a licensed userrather than an owner.

You are allowed to make copies of the program for backup purposes, but it is against the law to give copies to friends and colleagues.

Page 33: Computer crimes

Software TheftSoftware theft occurs when someone:

Discovering Computers 2010: Living in a Digital World Chapter 11

33Page 571

Steals software media

Intentionally erases

programs

Illegally copies a program

Illegally registers and/or

activates a program

Page 34: Computer crimes

Software TheftA single-user license agreement typically contains

the following conditions:

Discovering Computers 2010: Living in a Digital World Chapter 11

34Page 571

Permitted toPermitted to• Install the software on one computer• Make one copy of the software• Remove the software from your computer before giving it away or selling it

Not permitted toNot permitted to• Install the software on a network• Give copies to friends or colleagues while continuing to use the software• Export the software• Rent or lease the software

Page 35: Computer crimes

Software TheftCopying, loaning,

borrowing, renting, or distributing software can be a violation of copyright law

Some software requires product activation to function fully

Discovering Computers 2010: Living in a Digital World Chapter 11

35Pages 571 – 572Figure 11-16

Click to view Web Link,click Chapter 11, Click Web Link from left navigation, then click Business Software Alliance below Chapter 11

Page 36: Computer crimes

Hardware Theft and Vandalism

Hardware theft is the act of stealing

computer equipment

Hardware vandalism is the act

of defacing or destroying computer

equipment

Discovering Computers 2010: Living in a Digital World Chapter 11

36Page 570

Page 37: Computer crimes

Hardware Theft and VandalismTo help reduce the of chances of theft,

companies and schools use a variety of security measures

Discovering Computers 2010: Living in a Digital World Chapter 11

37Page 570Figure 11-15

Physical access controls

Alarm systems

Cables to lock equipment

Real time location system

Passwords, possessed objects, and biometrics

Page 38: Computer crimes

Information TheftInformation theft occurs when someone

steals personal or confidential informationEncryption is a process of converting

readable data into unreadable characters to prevent unauthorized access

Discovering Computers 2010: Living in a Digital World Chapter 11

38Pages 572 - 573Figure 11-17

Page 39: Computer crimes

Information Theft

Discovering Computers 2010: Living in a Digital World Chapter 11

39Page 573Figure 11-18

Page 40: Computer crimes

Information TheftA digital signature is an encrypted code

that a person, Web site, or organization attaches to an electronic message to verify the identity of the senderOften used to ensure that an impostor is not

participating in an Internet transaction

Web browsers and Web sites use encryption techniques

Discovering Computers 2010: Living in a Digital World Chapter 11

40Page 574

Page 41: Computer crimes

System FailureA system failure is the prolonged

malfunction(breakdown, fault) of a computerA variety of factors can lead to system failure,

including:Aging hardwareNatural disastersElectrical power problemsNoise, undervoltages, and overvoltages

Errors in computer programsDiscovering Computers 2010: Living in a

Digital World Chapter 1141Page 575

Page 42: Computer crimes

Backing Up – The Ultimate SafeguardA backup is a duplicate of a file, program, or

disk that can be used if the original is lost, damaged, or destroyedTo back up a file means to make a copy of it

Offsite backups are stored in a location separate from the computer site

Discovering Computers 2010: Living in a Digital World Chapter 11

42Page 577

•Cloud Storage

Page 43: Computer crimes

Backing Up – The Ultimate SafeguardTwo categories of

backups:Full backupSelective backup

Three-generation backup policy

Discovering Computers 2010: Living in a Digital World Chapter 11

43Page 577

Grandparent

Parent

Child

Page 44: Computer crimes

•44

Protecting Against Unauthorized Access, Use, and Computer Sabotage

Antivirus software: Used to detect and eliminate computer viruses and other types of malwareShould be set up to run continuously to check incoming e-mail

messages, instant messages, and downloaded filesShould be set up to scan the entire PC regularlyNeeds to be updated regularly since new malware is introduced

at all timesBest to have the program automatically download new virus

definitions on a regular basisSome programs also scan for other threats, such as spyware,

bots, possible phishing schemes, etc.

Page 45: Computer crimes

45

Protecting Against Unauthorized Access, Use, and Computer Sabotage

Firewall: Security system that provides a protective boundary between a computer or network and the outside worldWorks by closing down all external communications port

addressesBlocks access to the PC from outside crackersBlocks access to the Internet from programs on the user’s

PC unless authorized by the userImportant for home PCs that have a direct Internet

connection as well as for businessesIntrusion protection system (IPS) software is related

Monitors and analyzes traffic allowed by the firewall to try and detect possible attacks

Page 46: Computer crimes

46

Chapter 9Understanding

Computers, 11th Edition

Encryption and Other Security Tools

Encryption: method of scrambling e-mail or files to make them unreadable

Secure Web servers: use encryption to protect information transmitted via their Web pagesMost common is SSLLook for a locked padlock on the status bar and

https:// in the URLOnly transmit credit card numbers and other

sensitive data via a secure Web server

Page 47: Computer crimes

47

Chapter 9Understanding

Computers, 11th Edition

Page 48: Computer crimes

Protect Password

Use information that only an individual should knowUsernamesPINs PasswordsShould be strong passwords and changed

frequently

Page 49: Computer crimes

49

Passwords

Page 50: Computer crimes

Techniques Used for Computer Security

By taking the following precautionary steps, we can protect our computers from viruses and their affects.

Avoid downloading unnecessary files from unknown Internet websites.

Always scan downloaded contents & files before using (opening) them.

Don't open emails or attachments from unknown senders.

Use strong hard-to-guess passwords or pass-phrases. Do not use words that are commonly used. Remember that password cracking tools exist.

Page 51: Computer crimes

Techniques Used for Computer Security If your computer is on a network, make sure that you

have a good, fully functional and updated antivirus & firewall software installed on your computer.

Always scan all removable disks or drives (like USBs, CDs etc) through antivirus software before using (open) it.

Use anti-virus software and firewalls - keep them up to date.

Back-up your computer data on disks or CDs often. Don't share access to your computers with strangers. Disconnect from the Internet when not in use Encrypt document method of scrambling e-mail or files

to make them unreadable

Page 52: Computer crimes

Ethics and SocietyComputer ethics

are the moral guidelines that govern the use of computers and information systems

Information accuracy is a concernNot all information on

the Web is correct

Discovering Computers 2010: Living in a Digital World Chapter 11

52Pages 581 – 582Figure 11-28

Page 53: Computer crimes

Ethics and Society

Intellectual property rights are the rights to which creators are entitled for their work

• A copyright protects any tangible form of expression

An IT code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical

Discovering Computers 2010: Living in a Digital World Chapter 11

53Page 582

Click to view Web Link,click Chapter 11, Click Web Link from left navigation, then click Digital Rights Management below Chapter 11

Page 54: Computer crimes

Ethics and Society

Discovering Computers 2010: Living in a Digital World Chapter 11

54Page 583Figure 11-29

Page 55: Computer crimes

Video: Attack of the Mobile Viruses

Discovering Computers 2010: Living in a Digital World Chapter 11

55

•CLICK TO START


Top Related