Uploaded on

 

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
467
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
70
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. COMPUTER CRIME
  • 2. TYPES OF ATTACKS
    • Spam – any unsolicited email. Usually
    • considered a costly nuisance, spam now often contains malware.
    • Malware is a class of malicious software—viruses, worms, trojans, and spyware—that is designed to infect computers and systems and steal critical information, delete applications, drives and files, or convert computers into an asset for an outsider or attacker.
  • 3. TYPES OF ATTACKS
    • Denial of service attack – Malicious code that blocks service for users of a targeted system. The flood of incoming messages essentially forces the targeted system to shut down, thereby denying use by legitimate users.
    • Virus – a form of malware that infects computers or other electronic devices, making them unusable.
  • 4. TYPES OF ATTACKS
    • Phishing – a form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user IDS and passwords by creating a website similar to that of a legitimate organization, then directing email traffic to the fraudulent site to harvest what should be private information for financial or political gain.
  • 5. TYPES OF ATTACKS
    • Patches – programs designed to fix software security flaws, often installed automatically to reduce end-user participation and increase ease of use.
    • Click fraud is a type of Internet crime that occurs in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad's link
  • 6. TYPES OF ATTACKS
    • IP SPOOFING-- It  refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system.
    • BOTNET-- A   botnet  is a collection of compromised computers connected to the Internet. Termed "bots," they are generally used for malicious purposes. Botnets are usually controlled via standards based network protocols such as IRC
  • 7. TYPES OF ATTACKS
    • Spyware  is software which sends information to its creators about a user's activities – typically passwords, credit card numbers and other information that can be sold on the black market. 
    • Cyber stalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group.
  • 8. TYPES OF ATTACKS
    • ATTACKS THROUGH SOCIAL NETWORKING SITES-- Photos and personal information posted are an easy target for hackers, and many users have already had their personal pages infiltrated. Norton warns against opening suspicious messages that appear to be from friends, and from giving out passwords.
  • 9. TYPES OF ATTACKS
    • "Terrorist instructions hidden online" and "Terror groups hide behind Web encryption". The above two statements highlights the misuse of technology STEGANOGRAPHY.
    • Steganography  is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
  • 10. TYPES OF ATTACKS
    • Pharming -- H ackers lead users to bogus websites even if they’ve typed in their correct, intended URLs. Pharmers are more difficult to detect because they are not reliant upon the victim accepting a ‘bait’ message.
    • Shortened web addresses – users sometime are forced to clink on URLs that appear to have been shortened, they can lead to malware and infection.
  • 11. TYPES OF ATTACKS
    • Anonymous remailer
    • It is a server computer which receives messages with embedded instructions on where to send them next, and which forwards them without revealing where they originally came from.
    • ActiveX controls
    • These are capable of being programmed with malicious files such as viruses that can not only harm your computer but also transmit data such as passwords, credit card information to programmer.
  • 12. Thank you!