Presentation is loading. Please wait.

Presentation is loading. Please wait.

We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,

Similar presentations


Presentation on theme: "We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,"— Presentation transcript:

1 We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there, and we want to relax there and have our children be educated there and seek entertainment there. Those kinds of activities require law enforcement, require international treaties, require responsibility, corporate responsibility and personal responsibility. So we have a long way to go before cyberspace is as safe, even, as the highways. And as you know, the highways aren't all that safe. Computer Crime: Horses, Hacking and Hell Raising

2 Horses: A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. The term comes from a story in Homer's Iliad, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.

3 Viruses: http://www.cybercrime.gov/melissaSent.htm Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc. E-mail viruses - An e-mail virus moves around in e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. Code Red is a recent example of a nasty worm. Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.

4 Hacking: Gain unauthorized access to computer systems for the purpose of stealing and corrupting data. -Defeating systems through people weakness. - Logon mimicking. - Password guessing or default passwords. Recent Cases of Hacking: http://www.cybercrime.gov/gorshkovSent.htm http://www.cybercrime.gov/doppsPlea.htm

5 Hell Raising: Denial of Service attacks (DoS) are a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Two types of DoS are called a Zombie and Pulsing Zombie. IP Spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. Port Scanning is the act of systematically scanning a computer's ports. Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer. Port scanning has legitimate uses in managing networks, but port scanning also can be malicious in nature if someone is looking for a weakened access point to break into your computer.

6 Cybercrime Recent Cases http://www.cybercrime.gov/cccases.html A list of recent convictions of cybercrimes can be found at:

7 How It’s Done Let’s take a look at a simple example of how it might be done: 1) First we look for something that is “trusted” by computer systems. 2) We learn how email REALLY works

8 A Typical SMTP Transaction Scenario R: 220 BBN-UNIX.ARPA Simple Mail Transfer Service Ready S: HELO USC-ISIF.ARPA R: 250 BBN-UNIX.ARPA S: MAIL FROM: R: 250 OK S: RCPT TO: R: 250 OK S: RCPT TO: R: 550 No such user here S: RCPT TO: R: 250 OK S: DATA R: 354 Start mail input; end with. S: Blah blah blah... S:...etc. etc. etc. S:. R: 250 OK S: QUIT R: 221 BBN-UNIX.ARPA Service closing transmission channel

9 [Jim-Greenbergs-Computer:~] jimgreen% telnet smtp.oneonta.edu 25 Trying 137.141.15.30... Connected to smtp.oneonta.edu. Escape character is '^]'. 220 EXCHANGEN1.oneonta.edu Microsoft ESMTP MAIL Service, Version: 5.0.2195.5329 ready at Tue, 5 Nov 2002 08:10:23 -0500 helo 250 EXCHANGEN1.oneonta.edu Hello [137.141.12.36] mail from: 250 2.1.0 santa@north.pole....Sender OK rcpt to: 250 2.1.5 greenbjb@oneonta.edu data 354 Start mail input; end with. Hey Joe What'a know?. 250 2.6.0 Queued mail for delivery quit 221 2.0.0 EXCHANGEN1.oneonta.edu Service closing transmission channel Connection closed by foreign host. [Jim-Greenbergs-Computer:~] jimgreen%


Download ppt "We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,"

Similar presentations


Ads by Google