Robert Crawford, MBA West Middle School.  Identify techniques that intruders use to attack computer systems.  Discuss different types of cybercrime.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Lecturer: Fadwa Tlaelan
Unit 6 Digital Literacy Study S3 Obj 2-2
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Unit 18 Data Security 1.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Viruses & Destructive Programs
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Cyber Crimes.
Digital Citizenship By: Miranda Scorver.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Cyber crime & Security Prepared by : Rughani Zarana.
Viruses & Destructive Programs
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Types of Electronic Infection
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Malicious Software.
Computer Skills and Applications Computer Security.
INTRODUCTION & QUESTIONS.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Computer safety Filip Hruby.
Viruses & Destructive Programs
An Introduction to Phishing and Viruses
CYBER SECURITY...
IT Security  .
Viruses and Other Malicious Content
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
Chap 10 Malicious Software.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Robert Crawford, MBA West Middle School

 Identify techniques that intruders use to attack computer systems.  Discuss different types of cybercrime.  Summarize how computer crime costs business money. Essential Question What are the common types of Cybercrime, and how can I avoid being a victim?

 Computer Crime  Cybercrime  Downtime  Identity Theft  Memory shave  Phishing  Scanning  Software Piracy  Spoof  Superzapper  Time bomb  Trap door  Back door  Virus  Worm  Trojan Horse Not in text  Script Kiddie  Macro Virus

 What is Cyber-crime?  Computer Crime is a term for any illegal activity that uses a computer as its primary means of commission.  Cybercrime refers to crimes carried out by means of the internet (456) ◦ The U.S. Department of Justice expands the definition of cybercrime to include any illegal activity that uses a computer for the storage of evidence.

Page 454

 Many cybercrimes come from illegal access to networks. ◦ Remember, a network is a set of computers, connected to each other, to provide access to shared resources and information.

 Many cybercrimes come from illegal access to networks.  This access can be provided by: ◦ Viruses ◦ Worms ◦ Trojan Horse Programs ◦ Or other criminal techniques

 A computer virus is a malware program whose purpose is to damage or destroy computer data, cause a computer to behave in unexpected ways, or interfere with the operation of the network, all while concealing and replicating itself.  The defining characteristic of viruses is that they are self-replicating computer programs which install themselves without the user's consent.

 A macro virus is a virus hidden in a document ◦ Since some applications (notably, but not exclusively, the parts of Microsoft Office) allow macro programs to be embedded in documents, so that the programs may be run automatically when the document is opened, this provides a distinct mechanism by which viruses can be spread. This is why it may be dangerous to open unexpected attachments in s.  Macro Viruses can spread between platforms

 A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.  Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. ◦ Unlike a computer virus, it does not need to attach itself to an existing program.

 A Trojan horse, or Trojan, is a program disguised as useful but it is destructive to the data on the hard drive

 Software used to rapidly guess potential usernames and passwords ◦ Avoiding this vulnerability is one of the reasons that many websites only give you a few times to attempt to enter your password.

 In coding culture a script kiddie is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks, and deface websites.  It is generally assumed that script kiddies are juveniles who lack the ability to write sophisticated coding programs or exploits on their own, ◦ their objective is to try to impress their friends or gain credit in computer-enthusiast communities.  The term is typically intended as an insult.

 Using software that bypasses normal security constraints to allow unauthorized access to data. ◦ For example, such a program may issue commands directly to the disk drivers without going through normal file I/O routines, bypassing not only security restrictions but also leaving no audit trail.

 Faking the sending address (IP) of a transmission in order to gain illegal entry into a secure system.  The unauthorized use of a third-party domain name as the sender's name in an e- mail message. ◦ Most often used by spammers, spoofing the name of a popular retailer or organization entices the recipient to read the full message. ◦ We will look closer at this with Phishing

 Pronounced "fishing," it is a scam to steal valuable information such as credit card and social security numbers, user IDs and passwords.  An official-looking is sent to potential victims pretending to be from their bank or retail establishment.  s can be sent to people on selected lists or any list, expecting some percentage of recipients will actually have an account with the organization.

Is the "Bait"  The states that due to internal accounting errors or some other pretext, certain information must be updated to continue your service.  A link in the message directs the user to a Web page that asks for financial information.  The page looks genuine, because it is easy to fake a valid Web site. ◦ Remember spoofing  Any HTML page on the Web can be copied and modified to suit the phishing scheme.  Rather than go to a Web page, another option is to ask the user to call an 800 number and speak with a live person, who makes the scam seem even more genuine.

 This is more of a concern to business than individuals  A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. ◦ For example, a programmer may hide a piece of code that starts deleting files (such as a salary database trigger), should they ever be terminated from the company. ◦ Some viruses attack their host systems on specific dates, such as Friday the 13th or April Fool's Day. Trojans that activate on certain dates are often called "time bombs".

 A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing unauthorized remote access to a computer. ◦ The backdoor may take the form of an installed program (e.g., Back Orifice) or may subvert the system through a rootkit.  Default passwords can function as backdoors if they are not changed by the user.  Some debugging features can also act as backdoors if they are not removed in the release version.

 These are just plain old scams. ◦ e.g. “You have already won! send $50 for your portion of a $50,000 prize!”  The key word there was “portion.”  Your portion is going to be a very, very, very small one.

455 Crimes using the internet can take many forms

 This includes identity theft  You can be left with the bills  And a damaged credit rating

 The illegal copying and distribution of computer programs.  When you purchase a program you, typically are purchasing a single user license.  Piracy makes it harder for companies to sell their product. ◦ This can serve to discourage innovation

 Just plain old theft.  Most is “inside” ◦ Crimes committed by people who have legitimate access to the item being stolen.  Memory Shaving is hard to detect

 Just as defacing a building is vandalism, so is defacing a website  Further, it interferes with that availability to legitimate users.

456 Computer Crime: Any act that violates state or federal laws that involves using a computer Cybercrime: Crimes carried out by means of the internet

 The expense to business in repairing vandalism and making systems secure

 When the system has to be shutdown, there is downtime.  This costs the business money in: ◦ Business not done during that time ◦ Lack of availability to customers ◦ Lack of confidence to customers

 Customers loose confidence in the company: ◦ Its ability to meet their needs ◦ Its ability to secure their data

456 Law enforcement is using technology to catch cyber- criminals

 The Computer Crime and Intellectual Property Section (CCIPS) is a section of the Criminal Division of the U.S. Department of Justice in charge of investigating: ◦ computer crime (hacking, viruses, worms) ◦ and intellectual property crime and specializing in the search and seizure of digital evidence in computers and on networks.

 The NDCA CHIP Unit was created in response to the pressing need for a core of highly-trained and experienced federal prosecutors dedicated to prosecuting cybercrime and to assisting federal agencies in their investigative efforts in Silicon Valley.

 The National Infrastructure Protection Center (NIPC) was a unit of the United States federal government charged with protecting computer systems and information systems critical to the United States' infrastructure. ◦ It was founded in 1998 by President Bill Clinton's Presidential Decision Directive 63. ◦ It was originally created as a branch of the FBI. ◦ In 2003, the NIPC was transferred to the Department of Homeland Security.  The NIPC was eventually disbanded, with other federal government organizations taking on its responsibilities.

 Identify techniques that intruders use to attack computer systems.  Discuss different types of cybercrime.  Summarize how computer crime costs business money.

 Computer Crime  Cybercrime  Downtime  Identity Theft  Memory shave  Phishing  Scanning  Software Piracy  Spoof  Superzapper  Time bomb  Trap door  Back door  Virus  Worm  Trojan Horse Not in text  Script Kiddie  Macro Virus