Compsci 82, Fall 2009 13.1 Crime and Cybercrime l An act committed or omitted in violation of a law forbidding or commanding it and for which punishment.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
Network and Internet Security and Privacy.  Explain network and Internet security concerns  Identify online threats.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Security for Internet Every Day Use Standard Security Practices and New Threats.
Dan Boneh CS155 Computer Security Looking for undergrad research? Come see me!
Introduction to Security Computer Networks Computer Networks Term B10.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Chapter Nine Maintaining a Computer Part III: Malware.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Introduction to Honeypot, Botnet, and Security Measurement
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Combating cyber-crime: the context Justice Canada March 2005.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Digital Citizenship Project
CPS 82, Fall Crime l An act committed or omitted in violation of a low forbidding or commanding it and for which punishment is imposed upon conviction.
Cyber Crimes.
Viruses.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Cyber crime & Security Prepared by : Rughani Zarana.
Internet Security facilities for secure communication.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Scams & Schemes Common Sense Media.
Compsci 82, Fall Cybercrime, Cyberwar, Cyberterrorism l In nuclear deterrence, both the Americans and the Soviets knew it was all or nothing:
Introduction to Computer Ethics
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
 Introduction to Computing  Computer Programming  Terrorisom.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Compsci 82, Fall Cybercrime, Cyberwar, Cyberterrorism l In nuclear deterrence, both the Americans and the Soviets knew it was all or nothing:
International Telecommunication Union Geneva, 9(pm)-10 February 2009 Fighting cybercrime in 2009 Magnus Kalkuhl, Senior Virus Analyst Kaspersky Lab ITU-T.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Topic 5: Basic Security.
What is Spam? d min.
Cybercrime What is it, what does it cost, & how is it regulated?
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
AVAR 2004, Japan, Tokyo Today’s Threats and the Evolution of the Computer Underground Today’s Threats and the Evolution of the Computer Underground Eugene.
INTRODUCTION & QUESTIONS.
Information Systems Week 7 Securing Information Systems.
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Vocabulary Cassandra Peoples. Pharming the practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of extracting.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Botnets A collection of compromised machines
Identity theft vector of the electronic age
IT Security  .
Botnets A collection of compromised machines
Risk of the Internet At Home
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Marcial Quinones-Cardona
Communicating in the IT Industry
Presentation transcript:

Compsci 82, Fall Crime and Cybercrime l An act committed or omitted in violation of a law forbidding or commanding it and for which punishment is imposed upon conviction l Deviant behavior that violates prevailing norms --- cultural standards prescribing how humans ought to behave normally.

Compsci 82, Fall Cybercrime l What is cyber-crime? Cyber-terrorism?  Hackers, Crackers, Warez, Malware, cyber- bullying, Blackhats, Whitehats, DDOS l Cyberespionage, Cyber-sleuthing, Cyberwar  Imagined, real, over- or under-hyped? l Hacktivism  Electronic civil disobedience? l Criminal? Ethical? Enjoyable?  Why is the FBI involved in cybercrime?

Compsci 82, Fall Examples of Cybercrime l Social engineering/hacking: Kevin Mitnick  Markoff, Shimomura, solitary confinement l SPAM: is this a crime? Why  McColo stopped, SPAM too! LA Times, 11/14/08 McColo stopped, SPAM too! SPAM down two-thirds to 60 billion, McCol depeered  MindMap from Washington Post l Fake FDIC Phishing Scam Fake FDIC Phishing Scam l Botnets, cyberwar, cyberespionage?  Is this really happening? Haxis of Evil?

Compsci 82, Fall Illegal, immoral, unethical l Is pornography against the law? Is it a crime? What about posting a syllabus from a course, e.g., coursehero and other sites?  Other kinds of cyber activity/crime?   DOJ Kids and Internet Ethics DOJ Kids and Internet Ethics l Is sending SPAM against the law?  ftc CAN-SPAM ftc CAN-SPAM

Compsci 82, Fall SPAM, Botnets, Making Money l Orignal SPAM skit Orignal SPAM skit l Ordering toast instead of SPAM Ordering toast instead of SPAM

Compsci 82, Fall From worms to virii to botnets l How do computers get “infected”?  Is the terminology warranted?  Trojan horse, attachment, host  Virus travels without human intervention l When did this start? Personalities? Deeds?  Is there punishment? Too much/little?

Compsci 82, Fall Robert Tappan Morris l First Internet Worm  Worm v Virus? l Valedictorian  Delbarton, 1983 l Computer Fraud/Abuse  1990, probation+$10K l Sold Viaweb to Yahoo for $48M in 1998 l Professor at MIT l Father was Chief Scientist at NSA

Compsci 82, Fall DDOS: what and how l Distributed Denial Of Service  Terms? Mechanism l Misuse/abuse IP  SYN, Ping, Smurf l Why do botnets help in this regard? l IP addresses spoofed in SYN/Ping, why? l Defensive measures against DDOS?

Compsci 82, Fall Reporting on Botnets l BBC buys a botnet! BBC buys a botnet! l Aside from the legality of the scheme, the exercise raises troubling ethical questions. Security firms are almost unanimous in saying the behaviour of infected machines could have been illustrated without hacking into the machines of innocent victims

Compsci 82, Fall Srizbi stopped! We have observed that when a bot is unable to contact its hard coded control server, it will try to resolve the IP address of up to four domains. In our lab we have seen that a bot will then contact the server with this IP address and request a new template. Once a template is received it will begin spamming again: gyprtwqy.com, faruoeqa.com, dqdpdrqq.com, syudwtqy.com l Why did this go on for so long?

Compsci 82, Fall Crime or FUD? l “If it has compromised your machine once, it will do it again. We've seen evidence" of this, says Roel Schouwenberg, senior virus researcher for Kaspersky Lab, (discovered this new wave of Web attacks late last week.) l SQL injection attacks, which appear to originate from China, appear to have peaked yesterday, according to Kaspersky. Among the infected sites found by Kaspersky were Travelocity.com, countyofventura.org, and missouri.edu.

Compsci 82, Fall Dark Reading continued l Dan Hubbard, CTO at Websense, says the payloads vary, but many attacks appear designed to grab World of Warcraft credentials. "They do appear to have other capabilities, however, that allow them to update, disable AV, and...install more generic password stealers that could be used for a plethora of things.” l Is stealing a WoW password like hacking your Wachovia account?

Compsci 82, Fall Cybercrime or Cybersomethingelse? l YouTube Mitnick YouTube Mitnick  Kevin Mitnick on 60 minutes l YouTube on Cybercrime toolkit YouTube on Cybercrime toolkit  What’s right/wrong with this CBC video? l YouTube, new face of cybercrime? YouTube, new face of cybercrime?  The new “face” of cybercrime l Hackers trailer Hackers trailer l See links at class links to cybercrimeclass links to cybercrime

Compsci 82, Fall Spamalytics: Stefan Savage et al l …the only obvious way to extract this data is to build an e-commerce site, market it via spam, and then record the number of sales. Moreover, to capture the spammer’s experience with full fidelity such a study must also mimic their use of illicit botnets for distributing and proxying user responses.

Compsci 82, Fall Spamalytics: Stefan Savage et al l In effect, the best way to measure spam is to be a spammer. In this paper, we have effectively conducted this study, though sidestepping the obvious legal and ethical problems associated with sending spam. Critically, our study makes use of an existing spamming botnet. l National security threats by Internet Criminals

Compsci 82, Fall Phishing l What is phishing, how does it work, origins  and Web phishing attacks  Certificate Authorities: site really is!  User-interface and Human Factors issues  Tips on avoid being hooked l There is a banking and financial crisis  Why is this a boon to phishing expeditions? l Is this good advice?

Compsci 82, Fall From Phishing to Whaling l l