computer crime


Published on

Published in: Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

computer crime

  2. 2. TYPES OF ATTACKS <ul><li>Spam – any unsolicited email. Usually </li></ul><ul><li>considered a costly nuisance, spam now often contains malware. </li></ul><ul><li>Malware is a class of malicious software—viruses, worms, trojans, and spyware—that is designed to infect computers and systems and steal critical information, delete applications, drives and files, or convert computers into an asset for an outsider or attacker. </li></ul>
  3. 3. TYPES OF ATTACKS <ul><li>Denial of service attack – Malicious code that blocks service for users of a targeted system. The flood of incoming messages essentially forces the targeted system to shut down, thereby denying use by legitimate users. </li></ul><ul><li>Virus – a form of malware that infects computers or other electronic devices, making them unusable. </li></ul>
  4. 4. TYPES OF ATTACKS <ul><li>Phishing – a form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user IDS and passwords by creating a website similar to that of a legitimate organization, then directing email traffic to the fraudulent site to harvest what should be private information for financial or political gain. </li></ul>
  5. 5. TYPES OF ATTACKS <ul><li>Patches – programs designed to fix software security flaws, often installed automatically to reduce end-user participation and increase ease of use. </li></ul><ul><li>Click fraud is a type of Internet crime that occurs in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad's link </li></ul>
  6. 6. TYPES OF ATTACKS <ul><li>IP SPOOFING-- It  refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system. </li></ul><ul><li>BOTNET-- A   botnet  is a collection of compromised computers connected to the Internet. Termed &quot;bots,&quot; they are generally used for malicious purposes. Botnets are usually controlled via standards based network protocols such as IRC </li></ul>
  7. 7. TYPES OF ATTACKS <ul><li>Spyware  is software which sends information to its creators about a user's activities – typically passwords, credit card numbers and other information that can be sold on the black market.  </li></ul><ul><li>Cyber stalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group. </li></ul>
  8. 8. TYPES OF ATTACKS <ul><li>ATTACKS THROUGH SOCIAL NETWORKING SITES-- Photos and personal information posted are an easy target for hackers, and many users have already had their personal pages infiltrated. Norton warns against opening suspicious messages that appear to be from friends, and from giving out passwords. </li></ul>
  9. 9. TYPES OF ATTACKS <ul><li>&quot;Terrorist instructions hidden online&quot; and &quot;Terror groups hide behind Web encryption&quot;. The above two statements highlights the misuse of technology STEGANOGRAPHY. </li></ul><ul><li>Steganography  is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. </li></ul>
  10. 10. TYPES OF ATTACKS <ul><li>Pharming -- H ackers lead users to bogus websites even if they’ve typed in their correct, intended URLs. Pharmers are more difficult to detect because they are not reliant upon the victim accepting a ‘bait’ message. </li></ul><ul><li>Shortened web addresses – users sometime are forced to clink on URLs that appear to have been shortened, they can lead to malware and infection. </li></ul>
  11. 11. TYPES OF ATTACKS <ul><li>Anonymous remailer </li></ul><ul><li>It is a server computer which receives messages with embedded instructions on where to send them next, and which forwards them without revealing where they originally came from. </li></ul><ul><li>ActiveX controls </li></ul><ul><li>These are capable of being programmed with malicious files such as viruses that can not only harm your computer but also transmit data such as passwords, credit card information to programmer. </li></ul>
  12. 12. Thank you!