Download presentation
Presentation is loading. Please wait.
Published byDarleen Goodwin Modified over 9 years ago
2
CRIME - A crime is a wrongdoing classified by the state or Congress as a felony or misdemeanor. A crime is an offence against a public law. This word, in its most general sense, includes all offences, but in its more limited sense is confined to felony.
3
Denial-of-Service Attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users. Typically the targets are high-profile web servers, and the attack attempts to make the hosted web pages unavailable on the Internet.
4
It is an Internet crime that violates the Internet proper use policy as indicated by the Internet Architecture Board (IAB).
5
DoS attacks have two general forms: Force the victim computer(s) to reset or consume its resources such that it can no longer provide its intended service. Obstruct the communication media between the intended users and the victim so that they can no longer communicate adequately.
6
Not all service outages, even those that result from malicious activity, are necessarily denial-of-service attacks. Other types of attack may include a denial of service as a component, but the denial of service may be part of a larger attack.
7
A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms always harm the network (if only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer.
8
A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The original may modify the copies or the copies may modify themselves, as occurs in a metamorphic virus.
9
A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disc, CD, or USB drive.
10
Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses.
11
A worm, however, can spread itself to other computers without needing to be transferred as part of a host. A Trojan horse is a file that appears harmless until executed. In contrast to viruses, Trojan horses do not insert their code into other computer files.
12
Many personal computers are now connected to the Internet and to local-area networks, facilitating their spread. Today's viruses may also take advantage of network services such as the World Wide Web, email, and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware.
13
The term comes from the term virus in biology. A computer virus reproduces by making, possibly modified, copies of itself in the computer's memory, storage, or over a network. This is similar to the way a biological virus works.
14
Computer Negligence: Irresponsible actions that result in the deletion of a bank account or the premature discontinuation of electrical service. For example, if someone neglects their child then they will more than likely have DSS (Department of Social Services) come and take the children away. Then the parents will probably go to jail.
15
Computer incompetence: is when a company or program loses something due to carelessnes or someone not being able to control the software. For example, in 1992 a few minutes before closing time a Salomon Brothers, Inc. clerk hit the wrong key on a program-trading terminal and sent a sell order for $500 million in 50 major stocks onto the New York Stock Exchange. In the closing minutes of trading the Dow Jones Industrial Average dropped nearly 12 points.
16
An E-mail hoax is an act, document or artifact intended to deceive the public. An example is when someone sends you a message, usually forwarded, and tells you to forward the message to everyone you or something will happen. The message usually has information that they say if very important or urgent.
17
By changing certain properties of the e-mail, such as the From, Return-Path and Reply-To fields (which can be found in the message header), ill-intentioned users can make the e- mail appear to be from someone other than the actual sender. It is often associated with website spoofing which mimic an actual well-known website, but are run by another party either with fraudulent intentions or as a means of criticism of the organization’s activities.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.