business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh
CRIME & SECURITY Lecture 3.1
Computer Crimes – Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crime is a crime in which a computer plays an essential part. This type of crime is the illegal exploitation of computer technologies, usually involving the Internet, to support crimes.
Computer Crimes Hacking: – The act of defeating the security capabilities of a computer system in order to obtain an illegal access to the information stored on the computer system is called hacking. – The most common technique used technique used by hackers is scanning. Hackers have created tools that scan computers for weak spots. It can be an operating system that hasn't been upgraded or a port in the computer that it is open without the knowledge of the user. – Hackers use this "open window" to get inside your computer in order to do whatever they want to do. – The interesting thing about this is that these hacker tools are available for free in the Internet. So, with a couple of hours of instructions, almost every computer user can become a hacker.
Computer Crimes Computer Viruses – Computer viruses are computer programs that can replicate themselves and harm the computer systems on a network without the knowledge of the system users. – Writing computer viruses is a criminal activity as virus infections can crash computer systems, thereby destroying great amounts of critical data.
Computer Crimes Identity Theft: – This is one of the most serious frauds as it involves stealing money and obtaining other benefits through the use of a false identity. It is the act of pretending to be someone else by using someone else's identity as one's own. Cyber-stalking – The use of communication technology, mainly the Internet, to torture other individuals is known as cyber-stalking. False accusations, transmission of threats and damage to data and equipment fall under the class of cyber-stalking activities.
Computer Crimes Credit Card Fraud – According to a Gartner survey of 100 retailers, credit card fraud is the No. 1 problem in e- commerce. Ninety-three percent of purchases that are made online use credit cards as a form of payment. Credit card fraud happens when others use someone else's credit card to make purchases online. Credit card numbers can be stolen with false online forms or s.
Computer Virus Computer virus is a computer program that is written intentionally to negatively affects the working of a computer system by altering computer’s data or information without the knowledge or permission of actual user. The virus is having the ability to replicate itself, thus continuing to spread.
Types of Viruses Resident Viruses – This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc. Polymorphic Virus – This type of virus modifies itself each time it affects other program or file. It is most difficult virus to detect by an antivirus.
Types of Viruses Overwrite Viruses / Stealth Virus – Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected. The only way to clean a file infected by an overwrite virus is to delete the file completely. Boot Virus – This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.
Types of Viruses Macro Virus – Macro viruses infect files that are created using certain applications or programs that contain macros. File Infectors – This type of virus infects programs or executable files. When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category.
Types of Viruses Companion Viruses – They are known as companion viruses because once they get into the system they "accompany" the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run or act immediately by making copies of themselves. FAT Virus – This type of virus attack can be especially dangerous, they attack on FAT by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.
Types of Viruses Worms – A Worm is a program that copies itself repeatedly in memory or hard disk until no memory space remains. Ultimately computer stops working and needs restart again & again. Trojan Horse – Trojan horse is a virus program that hide itself with common computer files like zip file. Whenever the infected files are opened the virus activates. Logic Bombs – They are not considered as viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs. Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.
How to protect your computer? Always install Antivirus Software Regular update Antivirus software Regular update your operating system Do not use pirated software Always scan floppy, flash drive before using with the computer
Security Fire Walls – A network fire wall is a computer that protects computer networks from intrusion by serving as a safe transfer point for access to and from other networks. The fire wall computer screens external connections and requests to make sure that they are valid and compatible with the network. Irregular or unauthorized access requests are denied. Hence, fire walls serve as ‘gatekeepers’; keeping the system safe from intrusion.
Security Encryption – Is an important way to protect data that is transmitted via the Internet, intranets, or extranets. The contents of files can be scrambled using special mathematical algorithms. Users must have access to passwords that engage the scrambling and descrambling processing.
Security Monitor – While there is considerable debate about the violation of employee privacy, it is also true that is one of the favorite avenues of attack by hackers for spreading viruses or breaking into networked computers. Moreover, companies often have an interest in preventing illegal, personal, or damaging messages by employees. Companies should establish a clear monitoring policy that communicates to employees the reasons for monitoring, the appropriate use of , and disciplinary actions that can be taken in the case of violations.
Security Backup Files – Duplicate or back up files are an important security measure. Files can also be protected by file retention measures that involve storing copies from previous periods. These can be used to reconstruct current files. Such files may be stored off-premises and can be a key component in disaster recovery.