Computer and Internet Crimes PDF

Summary

This document is a presentation or lecture about computer and internet crimes. It covers various types of cyberattacks, notable crimes, and different types of threats. The presentation delves into concepts such as viruses, macro viruses, and script kiddies, and it also examines concepts in computer security such as confidentiality, integrity, and availability.

Full Transcript

Computer and Internet Crimes There are basically three overlapping types of Risks: 1. Bugs or misconfiguration problems that allow unauthorized remote users to:  Steal confidential documents  Execute commands on the host machine, allowing them to modify the system  Gain...

Computer and Internet Crimes There are basically three overlapping types of Risks: 1. Bugs or misconfiguration problems that allow unauthorized remote users to:  Steal confidential documents  Execute commands on the host machine, allowing them to modify the system  Gain information about the host machine, allowing them to break into the system  Launch denial-of-service attacks, rendering the machine temporarily unusable. The following is a list of some of the noted Computer crimes committed over the past years Citibank and Vladimir Levin (June-October, 1994) – Levin reportedly accomplished the break-ins by dialing into Citibank‘s cash management system. This system allowed clients to initiate their own fund transfers to other banks. Shamoon (2012) – It is a computer virus discovered in 2012 that attacks computers running the Microsoft Windows operating system. It is also known as Disttrack. Shamoon is capable of wiping files and rendering several computers on a network unusable. There are a number of different threats to securit and these are the following: A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. A macro virus is a virus that uses an application‘s own macro programming language to distribute itself. A script kiddie is a derogatory term for inexperienced crackers who use scripts and programs developed by others for the purpose of compromising computer accounts and files, and for launching attacks on whole computer systems. Elite hackers are people who are not only capable of writing scripts to exploit known vulnerabilities, but also capable of discovering new ones. Information Warfare – An information warfare is conducted against information and information processing equipment used by an adversary Computer security and network security Network security is a protection of networks and their services from unauthorized modification, destruction, or disclosure, and provision of assurance that the network performs its critical functions correctly and there are no harmful side-effects. CIA of security The original goal of computer and network security is to provide confidentiality, integrity, and availability. Confidentiality refers to the security principle that states that information should not be disclosed to unauthorized individuals. Integrity is the security principle that requires information to not be modified except by individuals authorized to do so. Availability applies to hardware, software, and data. All of these should be present and accessible when the subject (the user) wants to access or use them. Authentication deals with the desire to ensure that an individual is who they claim to be. Diversity of defense is a concept that complements the idea of various layers of security. Ergonomics is an approach which puts human needs and capabilities at the focus of designing technological systems. Time Information systems make it possible to commit unethical acts quickly. The following are the federal computer crime law Freedom of Information Act of 1970. Ensures access of individuals to personal data collected about them and about government activities in federal agency files. Mail Fraud Law General prohibition on pen register and trap and trace device use Pen Registers and Trap and Trace Devices Standards against fraud by wire, radio, or television Standards against Interception and disclosure of wire, oral, or electronic communications prohibited Wire and Electronic Communications Interception and Interception of Oral Communications A hacker is a person who enjoys computer technology and spends time learning and using computer systems. A criminal hacker, also called a cracker, is a computer-savvy person who attempts to gain unauthorized or illegal access to computer systems. In many cases, criminal hackers are people who are looking for fun and excitement – the challenge of beating the system.

Use Quizgecko on...
Browser
Browser