+ All Categories
Home > Technology > computer crime

computer crime

Date post: 29-Jan-2015
Category:
Upload: 00jitesh00
View: 491 times
Download: 3 times
Share this document with a friend
Description:
 
Popular Tags:
12
COMPUTER CRIME
Transcript
Page 1: computer crime

COMPUTER CRIME

Page 2: computer crime

TYPES OF ATTACKS

Spam – any unsolicited email. Usually considered a costly nuisance, spam now

often contains malware.

Malware is a class of malicious software—viruses, worms, trojans, and spyware—that is designed to infect computers and systems and steal criticalinformation, delete applications, drivesand files, or convert computers into an asset for an outsider or attacker.

Page 3: computer crime

TYPES OF ATTACKS

Denial of service attack – Malicious code that blocks service for users of a targeted system. The flood of incoming messages essentially forces the targeted system to shut down, thereby denying use by legitimate users.

Virus – a form of malware that infects computers or other electronic devices, making them unusable.

Page 4: computer crime

TYPES OF ATTACKS

Phishing – a form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user IDS and passwords by creating a website similar to that of a legitimate organization, then directing email traffic to the fraudulent site to harvest what should be private information for financial or political gain.

Page 5: computer crime

TYPES OF ATTACKS

• Patches – programs designed to fix software security flaws, often installed automatically to reduce end-user participation and increase ease of use.

• Click fraud is a type of Internet crime that occurs in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad's link

Page 6: computer crime

TYPES OF ATTACKS

• IP SPOOFING-- It refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system.

• BOTNET--A botnet is a collection of compromised computers connected to the Internet. Termed "bots," they are generally used for malicious purposes. Botnets are usually controlled via standards based network protocols such as IRC

Page 7: computer crime

TYPES OF ATTACKS

• Spyware is software which sends information to its creators about a user's activities – typically passwords, credit card numbers and other information that can be sold on the black market. 

• Cyber stalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group.

Page 8: computer crime

TYPES OF ATTACKS

• ATTACKS THROUGH SOCIAL NETWORKING SITES--Photos and personal information posted are an easy target for hackers, and many users have already had their personal pages infiltrated. Norton warns against opening suspicious messages that appear to be from friends, and from giving out passwords.

Page 9: computer crime

TYPES OF ATTACKS

"Terrorist instructions hidden online" and "Terror groups hide behind Web encryption". The above two statements highlights the misuse of technology STEGANOGRAPHY.

• Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.

Page 10: computer crime

TYPES OF ATTACKS

Pharming-- Hackers lead users to bogus websites even if they’ve typed in their correct, intended URLs. Pharmers are more difficult to detect because they are not reliant upon the victim accepting a ‘bait’ message.

Shortened web addresses –users sometime are forced to clink on URLs that appear to have been shortened, they can lead to malware and infection.

Page 11: computer crime

TYPES OF ATTACKS

Anonymous remailer It is a server computer which receives messages with

embedded instructions on where to send them next, and which forwards them without revealing where they originally came from.

ActiveX controls These are capable of being programmed with

malicious files such as viruses that can not only harm your computer but also transmit data such as passwords, credit card information to programmer.

Page 12: computer crime

Thank you!


Recommended