1. Malicious software : Chernobyl virus
The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all
computer data when an infected file is executed. Since many files are executed during computer
use, the virus is able to spread quickly and infect those files. The Chernobyl virus is the first
virus known to have the power to damage computer hardware. The activated viral strain attempts
to erase the hard drive and overwrite the system\'s BIOS as well.
The virus was detected as early as 1998, but its payload was first triggered April 16, 1999 -
which was the 13th anniversary of the disaster at the Chernobyl nuclear reactor.
Although U.S. and European computer users were affected, especially students and some
businesses, most of Chernobyl\'s damage was wrought in Asia and the Middle East.
Chernobyl actually is a variant of a virus known as CIH, the initials for the alleged author of the
virus, Chen Ing-hau, a Taiwanese computer engineering student.
CIH is sometimes referred to as a \"space filler virus,\" referring to its ability to clandestinely
take up file space on computers and prevent anti-virus software from running.
2. CHILD SOLICITING AND ABUSE : Child Soliciting and Abuse generally occurs when
criminals solicit minors via chat rooms for the purpose of child pornography.
Only 18% of youth use chat rooms, however, the majority of Internet-initiated sex crimes against
children are initiated in chat rooms.
In 82% of online sex crimes against minors, the offender used the victim\'s social networking
site to gain information about the victim\'s likes and dislikes.
At least 200 million girls and 100 million boys will be sexually victimized before they reach
adulthood
3. IDENTITY THEFT: ABRAHAM ABDALLAH
Abraham Abdallah was a high school dropout, but also ran one of the most elaborate internet-
based identity theft schemes in recent history. The restaurant busboy was able to breach credit
card companies, banks and other financial brokerages using the identities of some of the world’s
richest people. According to the New York City Police Department, Abdallah was able to steal
millions of dollars from people like movie director Steven Spielberg, CNN Founder Ted Turner,
financier George Soros and billionaire Warren Buffet, all from a computer inside of a Brooklyn,
New York City-based library. Abdallah successfully conned banks by posing to be financial
representatives for many of these individuals. He was eventually monitored and arrested after the
FBI received information from a financial institution that one of their clients did not request a
large transfer of money.
4. HACKING: THE SONY PICTURES HACK
A successful attack on Sony Pictures\' computer systems threw the entire studio into disarray in
late November. The hijackers\' identity and motivation remain unclear, though in the days
following the attack, evidence has surfaced to suggest it originated in North Korea. Rather than
attempting to steal money or o.
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. 1. Malicious software : Chernobyl virus
The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all
computer data when an infected file is executed. Since many files are executed during computer
use, the virus is able to spread quickly and infect those files. The Chernobyl virus is the first
virus known to have the power to damage computer hardware. The activated viral strain attempts
to erase the hard drive and overwrite the system's BIOS as well.
The virus was detected as early as 1998, but its payload was first triggered April 16, 1999 -
which was the 13th anniversary of the disaster at the Chernobyl nuclear reactor.
Although U.S. and European computer users were affected, especially students and some
businesses, most of Chernobyl's damage was wrought in Asia and the Middle East.
Chernobyl actually is a variant of a virus known as CIH, the initials for the alleged author of the
virus, Chen Ing-hau, a Taiwanese computer engineering student.
CIH is sometimes referred to as a "space filler virus," referring to its ability to clandestinely
take up file space on computers and prevent anti-virus software from running.
2. CHILD SOLICITING AND ABUSE : Child Soliciting and Abuse generally occurs when
criminals solicit minors via chat rooms for the purpose of child pornography.
Only 18% of youth use chat rooms, however, the majority of Internet-initiated sex crimes against
children are initiated in chat rooms.
In 82% of online sex crimes against minors, the offender used the victim's social networking
site to gain information about the victim's likes and dislikes.
At least 200 million girls and 100 million boys will be sexually victimized before they reach
adulthood
3. IDENTITY THEFT: ABRAHAM ABDALLAH
Abraham Abdallah was a high school dropout, but also ran one of the most elaborate internet-
based identity theft schemes in recent history. The restaurant busboy was able to breach credit
card companies, banks and other financial brokerages using the identities of some of the world’s
richest people. According to the New York City Police Department, Abdallah was able to steal
millions of dollars from people like movie director Steven Spielberg, CNN Founder Ted Turner,
financier George Soros and billionaire Warren Buffet, all from a computer inside of a Brooklyn,
New York City-based library. Abdallah successfully conned banks by posing to be financial
representatives for many of these individuals. He was eventually monitored and arrested after the
FBI received information from a financial institution that one of their clients did not request a
large transfer of money.
4. HACKING: THE SONY PICTURES HACK
2. A successful attack on Sony Pictures' computer systems threw the entire studio into disarray in
late November. The hijackers' identity and motivation remain unclear, though in the days
following the attack, evidence has surfaced to suggest it originated in North Korea. Rather than
attempting to steal money or otherwise profit from the information it obtained, this hack seems to
be focused on making life difficult for Sony Pictures employees. They have been subjected to
threats from the hacking group, which has posted much of the data it collected from the studio's
servers to the web.
5. CYBER STALKING:
Cyberstalking refers to the crime of using the Internet, email, or other types of electronic
communications to stalk, harass, or threaten another person. Cyberstalking most often involves
sending harassing emails, instant or text messages, or social media posts, or creating websites for
the sole purpose of tormenting the victim
e Violence Against Women Act of 2000 placed cyberstalking under the prevue of federal law in
the U.S. While many people find cyberstalking laws to be inadequate, state and federal
legislatures point out that cyberstalking laws are fairly new and, as technology continues to grow
and improve, so do the laws. Although specific laws vary, cyberstalking laws make it clear that
this type of harassment is a criminal offense. A conviction for cyberstalking may result in a
restraining order being issued, imprisonment,probation, fines, and restitution.
Key factors to identifying cyberstalking cases include:
False accusations. A cyberstalker often tries to damage the reputation of his victim by posting
false information on social media websites or blogs. A perpetrator may even create fictitious
websites or other accounts for the purpose of spreading false rumors and allegations about the
victim.
Gathering information about the victim. A cyberstalker may try to gather as much information as
possible about the victim by interacting with the victim’s friends, family, and colleagues. In
serious cases, a cyberstalker may hire a private investigator.
Monitoring victim’s activities. A cyberstalker may attempt to trace his victim’s IP address, or
hack into the victim’s social media accounts and emails to learn about his online activities.
Encouraging others to harass the victim. The offender may encourage the involvement of third
parties to harass the victim.
False victimization. It is not uncommon for a cyberstalker to claim the victim is harassing him,
taking the position of victim in his own mind.
protecting from cyber stalking
Save all emails, messages, and other communications for evidence. It is vital that these are not
altered in any way, and that the electronic copies are kept, rather than only printouts.
Save all records of threats against the victim’s safety or life. This includes any written or
3. recorded threats, and logs of the date, time, and circumstances of verbal threats.
Contact the perpetrator’s internet service provider. Internet service providers (ISP) prohibit their
users from using their service to harass others. Contacting the ISP may result in discontinuation
of the harasser’s internet service, and will put the ISP on notice to maintain record of the
harasser’s internet use.
Keep detailed records of contact with ISP and law enforcement officials. It is important to keep a
log of all reports made to any agency or provider, and to obtain copies of the official reports
when available.
Solution
1. Malicious software : Chernobyl virus
The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all
computer data when an infected file is executed. Since many files are executed during computer
use, the virus is able to spread quickly and infect those files. The Chernobyl virus is the first
virus known to have the power to damage computer hardware. The activated viral strain attempts
to erase the hard drive and overwrite the system's BIOS as well.
The virus was detected as early as 1998, but its payload was first triggered April 16, 1999 -
which was the 13th anniversary of the disaster at the Chernobyl nuclear reactor.
Although U.S. and European computer users were affected, especially students and some
businesses, most of Chernobyl's damage was wrought in Asia and the Middle East.
Chernobyl actually is a variant of a virus known as CIH, the initials for the alleged author of the
virus, Chen Ing-hau, a Taiwanese computer engineering student.
CIH is sometimes referred to as a "space filler virus," referring to its ability to clandestinely
take up file space on computers and prevent anti-virus software from running.
2. CHILD SOLICITING AND ABUSE : Child Soliciting and Abuse generally occurs when
criminals solicit minors via chat rooms for the purpose of child pornography.
Only 18% of youth use chat rooms, however, the majority of Internet-initiated sex crimes against
children are initiated in chat rooms.
In 82% of online sex crimes against minors, the offender used the victim's social networking
site to gain information about the victim's likes and dislikes.
At least 200 million girls and 100 million boys will be sexually victimized before they reach
adulthood
3. IDENTITY THEFT: ABRAHAM ABDALLAH
Abraham Abdallah was a high school dropout, but also ran one of the most elaborate internet-
4. based identity theft schemes in recent history. The restaurant busboy was able to breach credit
card companies, banks and other financial brokerages using the identities of some of the world’s
richest people. According to the New York City Police Department, Abdallah was able to steal
millions of dollars from people like movie director Steven Spielberg, CNN Founder Ted Turner,
financier George Soros and billionaire Warren Buffet, all from a computer inside of a Brooklyn,
New York City-based library. Abdallah successfully conned banks by posing to be financial
representatives for many of these individuals. He was eventually monitored and arrested after the
FBI received information from a financial institution that one of their clients did not request a
large transfer of money.
4. HACKING: THE SONY PICTURES HACK
A successful attack on Sony Pictures' computer systems threw the entire studio into disarray in
late November. The hijackers' identity and motivation remain unclear, though in the days
following the attack, evidence has surfaced to suggest it originated in North Korea. Rather than
attempting to steal money or otherwise profit from the information it obtained, this hack seems to
be focused on making life difficult for Sony Pictures employees. They have been subjected to
threats from the hacking group, which has posted much of the data it collected from the studio's
servers to the web.
5. CYBER STALKING:
Cyberstalking refers to the crime of using the Internet, email, or other types of electronic
communications to stalk, harass, or threaten another person. Cyberstalking most often involves
sending harassing emails, instant or text messages, or social media posts, or creating websites for
the sole purpose of tormenting the victim
e Violence Against Women Act of 2000 placed cyberstalking under the prevue of federal law in
the U.S. While many people find cyberstalking laws to be inadequate, state and federal
legislatures point out that cyberstalking laws are fairly new and, as technology continues to grow
and improve, so do the laws. Although specific laws vary, cyberstalking laws make it clear that
this type of harassment is a criminal offense. A conviction for cyberstalking may result in a
restraining order being issued, imprisonment,probation, fines, and restitution.
Key factors to identifying cyberstalking cases include:
False accusations. A cyberstalker often tries to damage the reputation of his victim by posting
false information on social media websites or blogs. A perpetrator may even create fictitious
websites or other accounts for the purpose of spreading false rumors and allegations about the
victim.
Gathering information about the victim. A cyberstalker may try to gather as much information as
possible about the victim by interacting with the victim’s friends, family, and colleagues. In
serious cases, a cyberstalker may hire a private investigator.
5. Monitoring victim’s activities. A cyberstalker may attempt to trace his victim’s IP address, or
hack into the victim’s social media accounts and emails to learn about his online activities.
Encouraging others to harass the victim. The offender may encourage the involvement of third
parties to harass the victim.
False victimization. It is not uncommon for a cyberstalker to claim the victim is harassing him,
taking the position of victim in his own mind.
protecting from cyber stalking
Save all emails, messages, and other communications for evidence. It is vital that these are not
altered in any way, and that the electronic copies are kept, rather than only printouts.
Save all records of threats against the victim’s safety or life. This includes any written or
recorded threats, and logs of the date, time, and circumstances of verbal threats.
Contact the perpetrator’s internet service provider. Internet service providers (ISP) prohibit their
users from using their service to harass others. Contacting the ISP may result in discontinuation
of the harasser’s internet service, and will put the ISP on notice to maintain record of the
harasser’s internet use.
Keep detailed records of contact with ISP and law enforcement officials. It is important to keep a
log of all reports made to any agency or provider, and to obtain copies of the official reports
when available.