Computer Crime & Security about computer

usmanahmadawan 10 views 57 slides Jun 02, 2024
Slide 1
Slide 1 of 57
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57

About This Presentation

Computer Crime & Security


Slide Content

Usman Ahmad

Atypeofcrimeinwhichacomputeristhetarget or
toolforanillegalactivityiscalledcomputer crime.
Itofteninvolvesstealing,usingorselling
company'spersonaldata.
Atypeofcrimethatreferstoanillegalact
involvingtheInternetiscalledcybercrime.

Thepersonswhocommitcomputercrimesare
knownascomputercriminalsorcybercriminals.
DifferentTypesofcomputercriminalsareas
follows:
Hackers,Crackers,ScriptKiddie,CorporateSpy,
UnethicalEmployee,CyberExtortionist,Cyber
Terrorist.

Hacker
Apersonwhoaccessesacomputerornetworkillegally for
knowledgepurposesisknownashacker.
Thistermwasoriginallyusedforcomputer
enthusiasts.
Cracker
Apersonwhoaccessesacomputerornetworkillegally for
somenegativepurposeisknownasCracker.
Acrackermaydestroydataandstealimportant
informationetc.

Hacker Cracker
Thegoodpeoplewhohackforknowledgepurposes. Theevilpersonwhobreaksintoasystemforbenefits.
Theyareskilledandhaveaadvanceknowledgeofcomputers
OSandprogramminglanguages.
Theymayormaynotbeskilled,someofcrackersjustknowsa
fewtrickstostealdata.
Theyworkinanorganisationtohelpprotecting theredata and giving
themexpertiseoninternetsecurity.
Thesearethe personfromwhichhackersprotect organisations
.
Hackerssharethe knowledgeandnever damagesthedata.
Iftheyfoundanyloopholetheyjustdeletethedataor
damagesthe data.
Hackersaretheethicalprofessionals.
Crackersareunethicalandwanttobenifit themselvesfrom illegal
tasks.
Hackersprogramorhackstocheckthe integrityand
vulnerability strengthofanetwork.
Crackersdonotmakenewtoolsbutusesomeoneelsetoolsfor
therecauseandharmthenetwork.
Hackershavelegalcertificateswiththeme.gCEHcertificates.
Crackersmayormaynothavecertificates,astheremotiveisto stay
anonymous.

ScriptKiddie
Apersonwhoattemptstoaccessacomputerornetworkillegally
withouttechnicalknowledgeisknownasscriptkiddie.
Thescriptkiddiesoftenusehackingorcrackingsoftwareto
accesscomputers.
CorporateSpy
Apersonwhoishiredtobreakintoaspecificcomputerisknown as
corporatespy.
Corporatespieshaveexcellentcomputerandnetworkskills.
Someorganizationshirethemtoidentifysecurityrisksinthe
organizationetc.

UnethicalEmployee
Theunethicalemployeesmayaccessthecomputerfor
differentreasons.
Somemaygetfinancialgainsbysellingconfidential
information.
Someunhappyemployeemaydothistogetrevenge
etc.

CyberExtortionist
Apersonwhousesemailastoolforextortion
(Blackmailing)isknownascyberextortionist.
Suchpersonssendemailtoacompanywithathreat.
Theytellcompanytopaymoneyotherwisetheywill
exposeconfidentialinformationofcompanyetc.

CyberTerrorist
ApersonwhousescomputerInternetornetworkto
destroyordamagecomputerforpoliticalreasonis
knownascyberterrorist.
Forexample,cyberterroristsmaydestroyairtraffic
controlsystem,electricity-generatingsystemsor
telecommunicationsystemofacountryetc.

LogicBomb
Itisaprogramthattriggersundercertainconditions.
Itisusuallyactivatedatacertaindate.
Itmaybeplantedincommercialsoftwarelikeshareware
software.
DataDiddling
Itisaprocessofchangingdatabeforeorasitentersthe
system.
Theauditorsmustverifytheaccuracyofthesourcedata and
theprocessingthatoccurs.
MethodsUsedby ComputerCriminals

Denialofservice
Itslowsdownacomputersystemornetwork.
Itfloodsacomputerornetworkwithrequestsfor
informationordata.
Theserverunderattackreceivessomanyrequeststhatit
cannotrespondtolegitimateusers.
Piggybacking
Itisaprocessofenteringthesystembyridingontheback of
anauthorizeduser.
Itoccurswhenanauthorizeduserdoesnotlogoffthe
systemproperly.Anillegalusermaycontinuewhere
originaluserleft.
MethodsUsedby Computer
Criminals

SalamiTechnique
Itisaprocessofgettingasmallamountofmoneyillegallyfromalarge
financialsystem.
Scavenging
Itisaprocessofsearchingcompany'strashcanstofinduseful
information.
Thethievessearchgarbageandrecyclingbinsofindividualstofind bank
accountnumbersetc.
TrapDoor
Itisanillegitimateprogramthatitselfwithinacompletedlegitimate
program.
Itallowssubsequentsentrybyunauthorizedusertochangethe
program.
MethodsUsedby Computer
Criminals

TrojanHorse
Itisaprogramthathidesitselfwithinausefulprogram.
Itexecutesillegaldestructiveinstructionsinthemiddleof a
programsuchascomputergame.
FormatCisanexampleofaTrojanHorse.
Zapping
Thezappingsoftware,isdesignedtobypassallsecurity
systems.
MethodsUsedby Computer
Criminals

Securityisasystemthatisusedtoprotecta
computersystemanddata.
Itprotectsfromintentionalandaccidental
damageoraccessbyunauthorizedpersons.
Acomputercandetectwhethertheuseris
authorizedornot.

Lossofhardware
Securityviolationmaycauselossofhardwareinthe
organization.
Forexample,anunauthorizedusermaystealinequipmentetc.
LossofProcessingAbility
Thesystemmayloseprocessingabilitywheninstallationofthe
systemisreturnedtoformerstateafteranysecurityviolation.
Anorganizationmayfaceseverelossifprocessingabilityis
suspended.
Forexample,abankcanlossthebusinessifthesystemstops
processing.

LossofSoftware
Asecurityviolationmaycauselossofsoftware.
Thesystemmaynotworkproperlyifthesoftware-filesare
damagedordeleted.
LossofData
Lossofdataisoneofthemostimportantproblems
causedbysecurityviolation.
AnorganizationcannotWorkproperlyifimportantdatais
lost.
Thelostdataisverydifficulttocollectagainforbig
organization

Theprotectionofdataiscalleddatasecurity.
Datastoredincomputercanbelostdueto
differentreasons.
Itcanbelostaccidentallyorsomeonecandamage it.
Datacanbelostcompletelyorpartially.
Dataismorevaluableandimportantthanthe
computeritself.

Itshouldbesavedinsuchawaythatitmaynotbelost or
damaged.
Someorganizationsobtaindatafromtheusersand
storedataonlinetoprovidefastServices
Someexamplesareasfollows:
Acreditcardcompanymaystoredataofitscustomers
online.
Abankmayprovideonlineservicesusingonlinedata
storagefortherecords.
Auniversitymayprovidethefacilityofonlineresults.

Datasecurityisveryimportanttorunsomeorganizations
successfully.
Apersonmayenterthenetworkofanorganizationand
gainunauthorizedaccesstothedata.
Forexample,hemayusethecreditcardnumberof
anotheruserforshopping.
Iftheunauthorizedpersondeletesimportantdata,the
businessoftheorganizationmaybedamagedseverely.
Soitisveryimportanttoprotectdatafromillegaland
unauthorizedaccess.

Computersecuritythreatcanbea
computerprogram,
anevent
oraperson
thatviolatescomputersecurity.

Itmayalsoaffecttheworkingifcomputer.
Differentsecuritytreatsareasfollows:
1.Hacker
2.HardwareTheft&Vandalism
3.SoftwareTheft
4.InformationTheft
5.SystemFailure
6.Virus
7.Phishing software
8.Malware software
9.Adware software
10.DenialofServiceAttack

Apersonwhoaccessesacomputer,networkanditsresources
illegallyisknownashacker.
Hackersarecomputerexpertsandusetheircomputer
knowledgefornegativepurpose.
Thehackermaystealthefollowing:
Theinformationoftheclientorcustomer
Creditcarddetailsforunauthorizeduse
Passwordstoaccesscomputersandnetworksillegally
Emailpasswordstouseemailaccountwithoutuser'sknowledge
1. Hacker

Hardwaretheftisaprocessofstealingthe hardware
equipmentsuchasharddiskormonitor etc.
Hardwarevandalismisaprocessofdefacingthe
hardwareequipment.
Forexample,anemployeeinanorganizationmay
damagekeyboardorcutthewiresetc.
2. Hardware theft & Vandalism

Softwaretheftmeansthatapersoncansteal
softwaremedia,erasesoftwareprogramorcopy it
withoutpermission.
Forexample,someonecanstealtheCD-ROMthat
containsthesoftwareprogram.
Anangryemployeemaydeletetheinstalled
softwarefromthecomputer.
3. Software Theft

4.InformationTheft
Informationtheftisanothercriticalsecurity
threat.
Itisaprocessofstealingpersonalorconfidential
informationwithoutpermission.
Thestoleninformationcanbefurtherusedfor
illegalactivities.
Forexample,someonemaystealthecreditcard
numberofanotherpersonanduseittobuythings
online.

following:
5.SystemFailure
Systemfailureisalsoanimportantsecuritythreat.
Itoccurswhenthesystemdoesnotfunctionproperly for
longertime.
Systemfailuremaycausefurtherlossofdata,
softwareandhardwareetc.
Itoccursduetovariousreasonsincludingthe
✓Obsoletehardware
✓Naturaldisastersuchasflood,fireorstorm
✓Fluctuationinpowersupplyetc.

6.Virus
Avirusisacomputerprogramthatmaydisturbthe
normalworkingofacomputersystem.
Virusattachesitselftofilesstoredonflashdrives,
emailattachmentsandharddisks.
Itmaycausemanydamagestoacomputersystem.
Aviruscan:
1.Damagedataorsoftwareoncomputer.
2.Deletesomeorallfilesonthecomputersystem.
3.Destroyalldatabyformattingharddrive.
4.Displayapoliticalorfalsemessageeveryfewtimes.

7. Phishing software
•Phishing software isa type of cybersecurity software that
identifies and blocks phishing content in emails, websites, or
other data access methods.
•Phishing attacks are fraudulent emails or text messages that
contain links to malicious websites that may contain malware.
•Some examples are includes:
•IronScales:A self-learning email security platform that uses
AI and human interaction to prevent phishing attempts
•Barracuda Sentinel:An AI-based protection that learns a
business's communication patterns to detect personalized
fraud in real-time
•Wifiphisher:A security tool that simulates and tests wireless

8. Malware Software
•Malware, or malicious software, isany software that is
intentionally designed to disrupt a computer, server, or
network.
•It can also leak private information, gain unauthorized access,
or interfere with the user's privacy.
•Malware can take many forms, including viruses, worms,
Trojan horses, ransomware, and spyware.
•Adware isa type of malware that displays ads on a
computer or mobile device, or redirects search results to
advertising websites.
•It can also collect user data for marketing purposes.
•Adware is designed to generate revenue by serving ads to

9. Adware Software
•Adware isa type of malware that displays ads on a computer
or mobile device, or redirects search results to advertising
websites.
•It can also collect user data for marketing purposes.
•Adware is designed to generate revenue by serving ads to an
internet user.

Adenialofservice(DOS)attackslowsdowna
computersystemornetwork.
Itfloodsacomputerornetworkwithrequestsfor
informationordata.
Themostcommontargetsofthisattackare
internetserviceproviders(ISPs)andcertain
websites.
Theserverundertheattackreceivessomany
requeststhatitcannotrespondtolegitimate.
10. Denial of service attack

Anadditionalcopyofdataorinformationstoredon
secondarystoragemediaiscalledthebackupofdata.
Thecommonmediaofbackuparezipdisk,magnetic
tape,floppydisk,CD-ROMandharddisketc.
Thecomputersystemcanbedamagedduetomany
reasons.
Thedatastoredonthesystemmayalsobelost,
deletedoraltered.

Sometimesthedataisveryimportantitcannotbe
createdagain.
Forexample,computerinabankmaycontainthe
recordsofallmoneytransactions.
Thebackupofdataisusedifyoursystemcrashes
accidentallyandthedatastoredinitislost.

1.Animportantfilecanbedeletedaccidentally.
2.Theusermayoverwriteapartorwholeofanexisting
file.
3.Amechanicalfailureinthecomputermayresultinloss of
data.
4.Avirusmaydamagethedatastoredonthecomputer.
5.Thecomputersystemmaybestolenbyanybody.
6.Thecomputersystemmaybedamagedduetofireor
powerfailure.

Itisveryimportanttotakethebackupofdata
regularly.
Itshouldbestoredatasafeandprotectedplace.
Inabidorganization,thebackupisnormally
storedonacentralizednetworkedcomputer.
Inasmallorganization,thebackupisstoredon
floppydisks,Zipdisks,orCD-ROM.

Therearetwowaystotakethebackupofdata:
1.CompleteBackup
2.IncrementalBackup

Backupofdataontheharddiskiscalledcomplete
backup.
Theadvantageofthisbackupisthattheentirehard
diskisbacked-up.
Thedatacanberestoredfromthisbackupincaseofa
probleminthesystem.
Ittakesmoretimeandstoragecapacitybecausethe
entiredataofharddiskiscopied.
1. Complete Backup

Incrementalbackupcreatesacopyofonlythedata
thatisnewlycreatedormodifiedsincethelast
backup.
Thisprocessisperformedautomaticallyinsome
software.
Inthistypeofbackup,theentirediskisnotcopied.
Ittakeslesstimeandspacetancompletebackup.
2. Incremental Backup

Differenttypesofmediacanbeusedforbackup of
data.
Theselectionofmediadependsuponthenature
andquantityofthedatatobebackedup.
1.USBFlashDrive
2.ExternalHardDisk
3.MagneticTape

USBFlashDrive
USBflashdriveisusedfordatabackup.
Itisveryeasytouseitbecauseitislightandsmallinsize.
Itisavailableindifferentshapes,sizesandCapacities.
ThestoragecapacityofUSBdriveis512MBto100GB
ExternalHardDisk
ItisaseparateharddiskandisconnectedtoUSBorFireWireportonthesystemunit.
Itsstoragecapacityisupto4TBandmore.
Itcanbeusedtobackupimportantfilesorentireinternalharddisk.
MagneticTape
Itisaconventionalandreliablemediaforbackup.
Itisusedforbackingupseveralthousandmillionbytesofdata.
Itismoreexpensivemedia.
Thedatastoredonthismediacannotbeaccessedrandomly.

Acomputervirusisaprogramthatmaydisturbthe
normalworkingofacomputersystem.
Virusattachesitselftofilesstoredonflashdrives,
emailattachmentsandharddisks.
Afilecontainingavirusiscalledinfectedfile.
Inthisfileiscopiedtoacomputer,virusisalsocopied to
thecomputer.
ExamplesofcomputervirusareCascade,Zmist,
BlasterandAntiExe.

Whenthecomputervirusstartsworking,itis
calledtheactivationofvirus.
Avirusnormallyrunsallthetimeinthecomputer.
Differentvirusesareactivatedindifferentways.
Manyvirusesareactivatedonacertaindate.
For,example,popularvirusFridaythe13thvirusis
activatedonlyifthedateis13anddayisFriday.

Computerviruscannotdamagecomputerhardware.It
maycausemanydamagestoacomputersystem.
Aviruscan:
1.Acomputerviruscandamagedataorsoftwareonthe
computer.
2.Itcandeletesomeoralltilesonthecomputer.system.
3.Itcandestroyalldatabyformattingharddrive.
4.Itmaydisplayapoliticalorfalsemessageeveryfew
times.

Avirusisspreadondifferentcomputersdueto
thefollowingreasons:
1.InfectedFlashDrivesordisks
2.EmailAttachments
3.InsecureWebsites
4.NetworksVirus
5.PiratedSoftware

Flashdrivesanddisksarethemaincauseof
spreadingviruses.
Flashdrivesanddisksareusedtotransferdata
fromonecomputertoother.
Aviruscanalsohecopiedfromonecomputerto
otherwhentheusercopiesinfectedfilesusing flash
drivesanddisks.
1.InfectedFlashDrivesordisks

Mostofthevirusesspreadthroughemails.
Emailattachmentisafilethatissentalongwithanemail.
Anemailmaycontainaninfectedfileattachment.
Viruscanspreadiftheuseropensanddownloadsanemail
attachment.
Itmayharmthecomputerwhenitisactivated.
Itmaydestroyfilesontheharddiskormaysendthevirus
automaticallytoallemailaddressessavedintheaddressbook.
2. Email Attachments

3. Insecure Websites
Thousandsofinsecurewebsitescaninfectcomputer withviruses.
Thesewebsitesaredevelopedtospreadvirusesorotherunethical
material.
Thevirusistransferredtotheuser'scomputerwhen thismaterial
isdownloaded.
Thesewebsitesmayaccess.thecomputer automatically
whentheusersvisitthem.

4. Networks Virus
Itcanspreadiftheuserconnectstoacomputer
networkthatcontainsvirus.
Theinternetisanexampleofsuchnetwork.
Whenauserdownloadsafileinfectedwithvirus
fromInternet,thevirusiscopiedtocomputer.
Itmayinfectthefilesstoredonthecomputer.

Anillegalcopyofsoftwareiscalledpiratedsoftware.
Viruscanspread,ifuserinstallspiratedsoftwarethat
containsavirus.
AvarietyofpiratedsoftwareisavailableinCDsand
fromtheinternet.
Somecompaniesintentionallyaidvirusinthe
software.
Thevirusisautomaticallyactivatediftheuserusesthe
softwarewithoutpurchasinglicense.
5. Pirated Software

VirusinfectscomputersystemifAntivirussoftwareisnotinstalled.
LatestAntivirussoftwareshouldbeinstalledoncomputertoprotectitfromviruses.
Acomputersystemcanbeprotectedfromvirusesbyfollowingtheseprecautions:
1.
2.
3.
4.
5.
6.
Thelastanti-virusshouldbeinstalledonthecomputer. The
antivirussoftwaremustbeupgradedregularly.ry. Thefloppy
diskshouldbescannedforvirusesbeforeuse. Junkor
unknownemailsshouldnotbeopened.
Unauthorizedorpiratedsoftwareshouldnotbeinstalledonthecomputer. An
Importantwayofprotectionagainstvirusistheuseofbackupofdata.The
backupisusedifthevirusdeletesdataormodifiesit.
FreewareandsharewaresoftwarefromtheInternetnormallycontainviruses.Itis
importanttocheckthesoftwarebeforeusingthem.
7.

Awormisaprogramthatcopiesitselfrepeatedly in
memoryorondiskuntilthereleftnospace.
Thecomputermaystopworkinginthissituation.
Wormsspreadsfromonecomputertoanother
throughnetworks.
SomeexamplesofwormareSQLSimmer,'the
BlasterWorm,sasser,ILOVEYOUandMelissa.

ATrojanhorseorTrojanisatypeofmalwarethat is
oftenhiddenaslegitimatesoftware.
Trojanscanbeemployedbycyber-thievesand
hackerstryingtogainaccesstousers'systems.
malwaretypicallyconsistsofcodedevelopedby cyber-
attackers,designedtocauseextensivedamage todataand
systemsortogainunauthorizedaccess toanetwork.

Computer
Worm
•Canself-
replicate
•Theydonot
needto
attach
themselves
withexisting
programs
Computer
Virus
•Canself-
replicate
•Attach
themselves
withexisting
programs
Trojan
Horse
•Cannotself-
replicate
•Usesocial
engineering
techniques
tospread.

CodeRed(Worm)
ItisawormthatinfectsacomputerrunningMicrosoftIISServer.
ItlaunchedtoDoSattackonthewebsiteofWhiteHouse.
Itallowsthehackertoaccesstheinfectedcomputerremotely.
Nimda(Worm)
Itisawormthatspreadsitselfusingdifferentmethods.
Itdamagescomputerindifferentways.
Itmodifiesfiles,alterssecuritysettingsanddegrades
performance.

Sircam(Worm)
Itisdistributedasanemailattachment.
Itmaydeletefiles,degradeperformanceandsendthe files
toanyone.
Melissa(Virus)
Itisavirusthatisdistributedasanemailattachment.
ItdisablesdifferentsafeguardsinMSWord.
Itsendsitselfto50peopleifMicrosoftOutlookis
installed.

Ripper(Virus)
Itcorruptsdatafromtheharddisks.
Concepts(Virus)
ItistransferredfromoneMSWordfiletootherifboth files
inmemory.
Itisalsotransferredasanemailattachment.
Itsavesthefileintemplatedirectoryinsteadofits
originallocation.

One-Half(Virus)
Itencryptsharddisksoonlythevirusmayreadthedata.
ItdisplaysOne-Halfonthescreenwhentheencryptionin half
completed.
Michelangelo(Virus)
ItdestroysalldataonharddiskonMarch6.
Cascade(alsoknownasHerbstlaubinGermany)
(Virus)
Itpicksrandomtextcharactersanddropsthemtothe
bottomofthescreen.