Download presentation
Presentation is loading. Please wait.
Published byRafe Logan Modified over 8 years ago
2
Dogaong, Charlie L. BSIT
3
The Department of Justice categorizes computer crime in three ways: The computer as a target – attacking the computers of others (spreading viruses is an example). The computer as a weapon -
4
using a computer to commit "traditional crime" that we see in the physical world (such as fraud or illegal gambling). The computer as an accessory – using a computer as a "fancy filing cabinet" to store illegal or stolen information.
5
malware that, when executed, replicates by inserting copies of itself. possibly modified into other computer programs, data files, or the boot sector of the hard drive self-replicating computer programs which install themselves without the user's consent.
6
stealing hard disk space or CPU time, accessing private information, corrupting data
7
Storm Virus, Sasser Virus, Nimda Virus, Melissa Virus, Code Red I and II Computer Viruses, Morris Computer Virus, ILOVEYOU Virus, Brain Computer Virus, Conficker, Elk Cloner
8
Melissa was a new virus for a new age: the email age. Forget floppies, this one was among the first to spread via the dreaded email attachment.
9
It also pioneered the art of breaking into your address book and sending itself to all your contacts. The virus would arrive via an innocent-looking email that told you to open a document.
10
First found on March 26, 1999, Melissa shut down Internet E-mail systems that got clogged with infected e-mails propagating from the virus. Melissa was not originally designed for harm, but it overloaded servers and caused problems.
11
David L. Smith
12
Eaton Town, New Jersey
13
Smith was sentenced to 10 years serving 20 months was fined US $5,000
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.