We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Presented by: Melissa Dark CERIAS, Purdue University.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Computer Threats I can understand computer threats and how to protect myself from these threats.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
James Tam Computer Security Concepts covered Malicious computer programs Malicious computer use Security measures.
Viruses and Spyware The Real Story Mr. G. From Whence Spyware Comes Spyware usually ends up on your machine because of something you do, like clicking.
Introduction to Security Computer Networks Computer Networks Term B10.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Viruses, Malicious Code, & Other Nasty Stuff Presented by: Melissa Dark K-12 Outreach Coordinator CERIAS, Purdue University
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
What is a Trojan Horse Virus? It is a program that is downloaded usually with a music or move file. They usually will erase memory, send credit card #s.
Shermaine L. Mahan. Social media netiquette is the social code for using social media. Social media is user generated content while netiquette is the.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Viruses & Destructive Programs
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
D. Beecroft Fremont High School VIRUSES.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Types of Electronic Infection
Trojan Horses What you need to know about one of the world’s most dangerous forms of malicious code.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
SMTP / MIME Florin Zidaru.
Malicious Software.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Cyber Security By:Jerusa Miller July 7, What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Computer virus Done: Aaesha Mohammed ID: H
Digital Media Safety Issues Physical Safety Issues Safety issues pertinent to digital media professionals fall under two categories: Physical.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Issues for Computer Users, Electronic Devices, Computer and Safety.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
By Lloyd and Jamie Brought to you by I safe. How to keep from being bullied (online) 1 don’t give out personal info such as passwords, pins, address,
Operating Systems Services provided on internet
Backdoor Attacks.
Computer Technology Notes 5
NET 311 Information Security
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Viruses Standard A-4 (Safety Unit)
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Technology Mrs. Huddleston
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there, and we want to relax there and have our children be educated there and seek entertainment there. Those kinds of activities require law enforcement, require international treaties, require responsibility, corporate responsibility and personal responsibility. So we have a long way to go before cyberspace is as safe, even, as the highways. And as you know, the highways aren't all that safe. Computer Crime: Horses, Hacking and Hell Raising

Horses: A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. The term comes from a story in Homer's Iliad, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.

Viruses: Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc. viruses - An virus moves around in messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's address book. Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. Code Red is a recent example of a nasty worm. Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.

Hacking: Gain unauthorized access to computer systems for the purpose of stealing and corrupting data. -Defeating systems through people weakness. - Logon mimicking. - Password guessing or default passwords. Recent Cases of Hacking:

Hell Raising: Denial of Service attacks (DoS) are a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Two types of DoS are called a Zombie and Pulsing Zombie. IP Spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. Port Scanning is the act of systematically scanning a computer's ports. Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer. Port scanning has legitimate uses in managing networks, but port scanning also can be malicious in nature if someone is looking for a weakened access point to break into your computer.

Cybercrime Recent Cases A list of recent convictions of cybercrimes can be found at:

How It’s Done Let’s take a look at a simple example of how it might be done: 1) First we look for something that is “trusted” by computer systems. 2) We learn how REALLY works

A Typical SMTP Transaction Scenario R: 220 BBN-UNIX.ARPA Simple Mail Transfer Service Ready S: HELO USC-ISIF.ARPA R: 250 BBN-UNIX.ARPA S: MAIL FROM: R: 250 OK S: RCPT TO: R: 250 OK S: RCPT TO: R: 550 No such user here S: RCPT TO: R: 250 OK S: DATA R: 354 Start mail input; end with. S: Blah blah blah... S:...etc. etc. etc. S:. R: 250 OK S: QUIT R: 221 BBN-UNIX.ARPA Service closing transmission channel

[Jim-Greenbergs-Computer:~] jimgreen% telnet smtp.oneonta.edu 25 Trying Connected to smtp.oneonta.edu. Escape character is '^]'. 220 EXCHANGEN1.oneonta.edu Microsoft ESMTP MAIL Service, Version: ready at Tue, 5 Nov :10: helo 250 EXCHANGEN1.oneonta.edu Hello [ ] mail from: OK rcpt to: data 354 Start mail input; end with. Hey Joe What'a know? Queued mail for delivery quit EXCHANGEN1.oneonta.edu Service closing transmission channel Connection closed by foreign host. [Jim-Greenbergs-Computer:~] jimgreen%