CPS 82, Fall 2008 18.1 Crime l An act committed or omitted in violation of a low forbidding or commanding it and for which punishment is imposed upon conviction.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
7 Effective Habits when using the Internet Philip O’Kane 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Kevin Mitnick Home Internet Security Course Today, Internet criminals are going after families. They try to guess your passwords and steal your credit.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Security for Internet Every Day Use Standard Security Practices and New Threats.
Dan Boneh CS155 Computer Security Looking for undergrad research? Come see me!
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
Internet Security Awareness Presenter: Royce Wilkerson.
Cyber X-Force-SMS alert system for threats.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Security (Computer crime and dangers associated with computer use). Legislation (Data Protection, Computer Misuse and Copyright Acts). 4 th module
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
BY AISLING PHILPOTT e-safety. S s can be dangerous because you could Fall victim to a scam for money. you could fall for someone wanting to.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Combating cyber-crime: the context Justice Canada March 2005.
Compsci 82, Fall Crime and Cybercrime l An act committed or omitted in violation of a law forbidding or commanding it and for which punishment.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Cyber Crimes.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Scams & Schemes Common Sense Media.
Compsci 82, Fall Cybercrime, Cyberwar, Cyberterrorism l In nuclear deterrence, both the Americans and the Soviets knew it was all or nothing:
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
CYBER CRIME.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Lit Space Monitoring for Botnets Stuart Staniford Chief Scientist 1/21/2008.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Compsci 82, Fall Cybercrime, Cyberwar, Cyberterrorism l In nuclear deterrence, both the Americans and the Soviets knew it was all or nothing:
International Telecommunication Union Geneva, 9(pm)-10 February 2009 Fighting cybercrime in 2009 Magnus Kalkuhl, Senior Virus Analyst Kaspersky Lab ITU-T.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Cybercrime What is it, what does it cost, & how is it regulated?
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
AVAR 2004, Japan, Tokyo Today’s Threats and the Evolution of the Computer Underground Today’s Threats and the Evolution of the Computer Underground Eugene.
A threat to global security and economy Koushik Mannepalli CMPE 294.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
INTRODUCTION & QUESTIONS.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
CYBER RISKS IN THE HEALTHCARE INDUSTRY HIROC 's Annual Risk Management Conference, April 2015 Jim Patterson, Partner, Co-Head of Fraud Law, Toronto, Bennett.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Presented by : Matthew Sulkosky COSC 316 (Host Security) BOTNETS A.K.A ZOMBIE COMPUTING.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Matt Jennings.  Introduction  Value Chains  Major value chains in the illegal market  Means of Communication  Conclusion.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
IT Security  .
Security Threats Haunting the E-Commerce Industry. How Can Security Testing Help?
“CYBER SPACE” - THE UNDERGROUND ECONOMY
Risk of the Internet At Home
Malware CJ
Anatomy of a Large Scale Attack
Marcial Quinones-Cardona
Communicating in the IT Industry
Presentation transcript:

CPS 82, Fall Crime l An act committed or omitted in violation of a low forbidding or commanding it and for which punishment is imposed upon conviction l Deviant behavior that violates prevailing norms --- cultural standards prescribing how humans ought to behave normally. l Is pornography against the law? Is it a crime? What about posting a syllabus from a course? l l

CPS 82, Fall Cybercrime l What is cyber-crime? Cyber-terrorism?  Hackers, Crackers, Warez, Malware, cyber- bullying,..., Phrack, l0pht (old hacker)  Hacktivism  What’s criminal, what’s unethical, what’s fun? l Are online crimes virtual or real?  Is a website real? Does it exist?  Is bullying a crime?  Is stealing intellectual property like stealing a wallet?

CPS 82, Fall Examples of Cybercrime l Social engineering and hacking: Kevin Mitnick  Claims he didn’t use technical tools  Markoff, Shimomura, solitary confinement l SPAM: is this a crime? Why  LA Times, 11/14/08  SPAM down two-thirds to 60 billion  Upstream ISPs cut off/de-peer McColo Corp  MindMap

CPS 82, Fall Srizbi stopped! We have observed that when a bot is unable to contact its hard coded control server, it will try to resolve the IP address of up to four domains. In our lab we have seen that a bot will then contact the server with this IP address and request a new template. Once a template is received it will begin spamming again: gyprtwqy.com, faruoeqa.com, dqdpdrqq.com, syudwtqy.com l Why did this go on for so long?

CPS 82, Fall Crime or FUD? l If it has compromised your machine once, it will do it again. We've seen evidence" of this, says Roel Schouwenberg, senior virus researcher for Kaspersky Lab, which first discovered this new wave of Web attacks late last week. l The SQL injection attacks, which appear to originate from China, appear to have peaked yesterday, according to Kaspersky. Among the infected sites found by Kaspersky were Travelocity.com, countyofventura.org, and missouri.edu.

CPS 82, Fall Dark Reading continued l Dan Hubbard, CTO at Websense, says the payloads vary, but many attacks appear designed to grab World of Warcraft credentials. "They do appear to have other capabilities, however, that allow them to update, disable AV, and...install more generic password stealers that could be used for a plethora of things." l I stealing a WoW password like hacking your Wachovia account?

CPS 82, Fall Cybercrime or Cybersomethingelse? l  Kevin Mitnick on 60 minutes l  What’s right and wrong with this CBC video? l  The new “face” of cybercrime l  L0pht participants reconvene

CPS 82, Fall SPAM, Botnets, Making Money l l

CPS 82, Fall Spamalytics: Stefan Savage et al l …the only obvious way to extract this data is to build an e-commerce site, market it via spam, and then record the number of sales. Moreover, to capture the spammer’s experience with full fidelity such a study must also mimic their use of illicit botnets for distributing and proxying user responses. l In effect, the best way to measure spam is to be a spammer. In this paper, we have effectively conducted this study, though sidestepping the obvious legal and ethical problems associated with sending spam. Critically, our study makes use of an existing spamming botnet.

CPS 82, Fall Phishing l What is phishing, how does it work, origins  phishing attack  Web-based phishing attack  Certificate Authorities (CAs): a browser is what it says  User-interface and Human Factors issues  Tips on avoid being hooked l There is a banking and financial crisis  Why is this a boon to phishing expeditions? l Is this good advice?

CPS 82, Fall From Phishing to Whaling l

CPS 82, Fall Malware and Crimeware l How is malware or crimeware distributed?  Web, , hacking, worm  Social engineering: attachment, piggy-backing  (1) Distribute (2) Infect (3) Execute (4) Trouble l DDOS, Spam, Click fraud, Data Ransom, ID theft  How can downloaded programs/code do this?  Why is Windows a more likely target?  What can you do to combat this threat?