SlideShare a Scribd company logo
1 of 5
Download to read offline
1. Malicious software : Chernobyl virus
The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all
computer data when an infected file is executed. Since many files are executed during computer
use, the virus is able to spread quickly and infect those files. The Chernobyl virus is the first
virus known to have the power to damage computer hardware. The activated viral strain attempts
to erase the hard drive and overwrite the system's BIOS as well.
The virus was detected as early as 1998, but its payload was first triggered April 16, 1999 -
which was the 13th anniversary of the disaster at the Chernobyl nuclear reactor.
Although U.S. and European computer users were affected, especially students and some
businesses, most of Chernobyl's damage was wrought in Asia and the Middle East.
Chernobyl actually is a variant of a virus known as CIH, the initials for the alleged author of the
virus, Chen Ing-hau, a Taiwanese computer engineering student.
CIH is sometimes referred to as a "space filler virus," referring to its ability to clandestinely
take up file space on computers and prevent anti-virus software from running.
2. CHILD SOLICITING AND ABUSE : Child Soliciting and Abuse generally occurs when
criminals solicit minors via chat rooms for the purpose of child pornography.
Only 18% of youth use chat rooms, however, the majority of Internet-initiated sex crimes against
children are initiated in chat rooms.
In 82% of online sex crimes against minors, the offender used the victim's social networking
site to gain information about the victim's likes and dislikes.
At least 200 million girls and 100 million boys will be sexually victimized before they reach
adulthood
3. IDENTITY THEFT: ABRAHAM ABDALLAH
Abraham Abdallah was a high school dropout, but also ran one of the most elaborate internet-
based identity theft schemes in recent history. The restaurant busboy was able to breach credit
card companies, banks and other financial brokerages using the identities of some of the world’s
richest people. According to the New York City Police Department, Abdallah was able to steal
millions of dollars from people like movie director Steven Spielberg, CNN Founder Ted Turner,
financier George Soros and billionaire Warren Buffet, all from a computer inside of a Brooklyn,
New York City-based library. Abdallah successfully conned banks by posing to be financial
representatives for many of these individuals. He was eventually monitored and arrested after the
FBI received information from a financial institution that one of their clients did not request a
large transfer of money.
4. HACKING: THE SONY PICTURES HACK
A successful attack on Sony Pictures' computer systems threw the entire studio into disarray in
late November. The hijackers' identity and motivation remain unclear, though in the days
following the attack, evidence has surfaced to suggest it originated in North Korea. Rather than
attempting to steal money or otherwise profit from the information it obtained, this hack seems to
be focused on making life difficult for Sony Pictures employees. They have been subjected to
threats from the hacking group, which has posted much of the data it collected from the studio's
servers to the web.
5. CYBER STALKING:
Cyberstalking refers to the crime of using the Internet, email, or other types of electronic
communications to stalk, harass, or threaten another person. Cyberstalking most often involves
sending harassing emails, instant or text messages, or social media posts, or creating websites for
the sole purpose of tormenting the victim
e Violence Against Women Act of 2000 placed cyberstalking under the prevue of federal law in
the U.S. While many people find cyberstalking laws to be inadequate, state and federal
legislatures point out that cyberstalking laws are fairly new and, as technology continues to grow
and improve, so do the laws. Although specific laws vary, cyberstalking laws make it clear that
this type of harassment is a criminal offense. A conviction for cyberstalking may result in a
restraining order being issued, imprisonment,probation, fines, and restitution.
Key factors to identifying cyberstalking cases include:
False accusations. A cyberstalker often tries to damage the reputation of his victim by posting
false information on social media websites or blogs. A perpetrator may even create fictitious
websites or other accounts for the purpose of spreading false rumors and allegations about the
victim.
Gathering information about the victim. A cyberstalker may try to gather as much information as
possible about the victim by interacting with the victim’s friends, family, and colleagues. In
serious cases, a cyberstalker may hire a private investigator.
Monitoring victim’s activities. A cyberstalker may attempt to trace his victim’s IP address, or
hack into the victim’s social media accounts and emails to learn about his online activities.
Encouraging others to harass the victim. The offender may encourage the involvement of third
parties to harass the victim.
False victimization. It is not uncommon for a cyberstalker to claim the victim is harassing him,
taking the position of victim in his own mind.
protecting from cyber stalking
Save all emails, messages, and other communications for evidence. It is vital that these are not
altered in any way, and that the electronic copies are kept, rather than only printouts.
Save all records of threats against the victim’s safety or life. This includes any written or
recorded threats, and logs of the date, time, and circumstances of verbal threats.
Contact the perpetrator’s internet service provider. Internet service providers (ISP) prohibit their
users from using their service to harass others. Contacting the ISP may result in discontinuation
of the harasser’s internet service, and will put the ISP on notice to maintain record of the
harasser’s internet use.
Keep detailed records of contact with ISP and law enforcement officials. It is important to keep a
log of all reports made to any agency or provider, and to obtain copies of the official reports
when available.
Solution
1. Malicious software : Chernobyl virus
The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all
computer data when an infected file is executed. Since many files are executed during computer
use, the virus is able to spread quickly and infect those files. The Chernobyl virus is the first
virus known to have the power to damage computer hardware. The activated viral strain attempts
to erase the hard drive and overwrite the system's BIOS as well.
The virus was detected as early as 1998, but its payload was first triggered April 16, 1999 -
which was the 13th anniversary of the disaster at the Chernobyl nuclear reactor.
Although U.S. and European computer users were affected, especially students and some
businesses, most of Chernobyl's damage was wrought in Asia and the Middle East.
Chernobyl actually is a variant of a virus known as CIH, the initials for the alleged author of the
virus, Chen Ing-hau, a Taiwanese computer engineering student.
CIH is sometimes referred to as a "space filler virus," referring to its ability to clandestinely
take up file space on computers and prevent anti-virus software from running.
2. CHILD SOLICITING AND ABUSE : Child Soliciting and Abuse generally occurs when
criminals solicit minors via chat rooms for the purpose of child pornography.
Only 18% of youth use chat rooms, however, the majority of Internet-initiated sex crimes against
children are initiated in chat rooms.
In 82% of online sex crimes against minors, the offender used the victim's social networking
site to gain information about the victim's likes and dislikes.
At least 200 million girls and 100 million boys will be sexually victimized before they reach
adulthood
3. IDENTITY THEFT: ABRAHAM ABDALLAH
Abraham Abdallah was a high school dropout, but also ran one of the most elaborate internet-
based identity theft schemes in recent history. The restaurant busboy was able to breach credit
card companies, banks and other financial brokerages using the identities of some of the world’s
richest people. According to the New York City Police Department, Abdallah was able to steal
millions of dollars from people like movie director Steven Spielberg, CNN Founder Ted Turner,
financier George Soros and billionaire Warren Buffet, all from a computer inside of a Brooklyn,
New York City-based library. Abdallah successfully conned banks by posing to be financial
representatives for many of these individuals. He was eventually monitored and arrested after the
FBI received information from a financial institution that one of their clients did not request a
large transfer of money.
4. HACKING: THE SONY PICTURES HACK
A successful attack on Sony Pictures' computer systems threw the entire studio into disarray in
late November. The hijackers' identity and motivation remain unclear, though in the days
following the attack, evidence has surfaced to suggest it originated in North Korea. Rather than
attempting to steal money or otherwise profit from the information it obtained, this hack seems to
be focused on making life difficult for Sony Pictures employees. They have been subjected to
threats from the hacking group, which has posted much of the data it collected from the studio's
servers to the web.
5. CYBER STALKING:
Cyberstalking refers to the crime of using the Internet, email, or other types of electronic
communications to stalk, harass, or threaten another person. Cyberstalking most often involves
sending harassing emails, instant or text messages, or social media posts, or creating websites for
the sole purpose of tormenting the victim
e Violence Against Women Act of 2000 placed cyberstalking under the prevue of federal law in
the U.S. While many people find cyberstalking laws to be inadequate, state and federal
legislatures point out that cyberstalking laws are fairly new and, as technology continues to grow
and improve, so do the laws. Although specific laws vary, cyberstalking laws make it clear that
this type of harassment is a criminal offense. A conviction for cyberstalking may result in a
restraining order being issued, imprisonment,probation, fines, and restitution.
Key factors to identifying cyberstalking cases include:
False accusations. A cyberstalker often tries to damage the reputation of his victim by posting
false information on social media websites or blogs. A perpetrator may even create fictitious
websites or other accounts for the purpose of spreading false rumors and allegations about the
victim.
Gathering information about the victim. A cyberstalker may try to gather as much information as
possible about the victim by interacting with the victim’s friends, family, and colleagues. In
serious cases, a cyberstalker may hire a private investigator.
Monitoring victim’s activities. A cyberstalker may attempt to trace his victim’s IP address, or
hack into the victim’s social media accounts and emails to learn about his online activities.
Encouraging others to harass the victim. The offender may encourage the involvement of third
parties to harass the victim.
False victimization. It is not uncommon for a cyberstalker to claim the victim is harassing him,
taking the position of victim in his own mind.
protecting from cyber stalking
Save all emails, messages, and other communications for evidence. It is vital that these are not
altered in any way, and that the electronic copies are kept, rather than only printouts.
Save all records of threats against the victim’s safety or life. This includes any written or
recorded threats, and logs of the date, time, and circumstances of verbal threats.
Contact the perpetrator’s internet service provider. Internet service providers (ISP) prohibit their
users from using their service to harass others. Contacting the ISP may result in discontinuation
of the harasser’s internet service, and will put the ISP on notice to maintain record of the
harasser’s internet use.
Keep detailed records of contact with ISP and law enforcement officials. It is important to keep a
log of all reports made to any agency or provider, and to obtain copies of the official reports
when available.

More Related Content

Similar to 1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf

Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationBenjamin Morley
 
Internet
InternetInternet
InternetJodip
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by RudyUdieh Moody
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 

Similar to 1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf (20)

Stalking2
Stalking2Stalking2
Stalking2
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Internet
InternetInternet
Internet
 
Final ppt
Final pptFinal ppt
Final ppt
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Famous hackers
Famous hackersFamous hackers
Famous hackers
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 

More from aesalem06

#!binbash# Decode a UDP packet raw binary dataDonelet offs=40.pdf
#!binbash# Decode a UDP packet raw binary dataDonelet offs=40.pdf#!binbash# Decode a UDP packet raw binary dataDonelet offs=40.pdf
#!binbash# Decode a UDP packet raw binary dataDonelet offs=40.pdfaesalem06
 
Youd only need SOCl2 So d then na .pdf
                     Youd only need SOCl2  So d then na             .pdf                     Youd only need SOCl2  So d then na             .pdf
Youd only need SOCl2 So d then na .pdfaesalem06
 
you can see the difference bw IE5 and IE6 is ver.pdf
                     you can see the difference bw IE5 and IE6 is ver.pdf                     you can see the difference bw IE5 and IE6 is ver.pdf
you can see the difference bw IE5 and IE6 is ver.pdfaesalem06
 
they have the same vapour pressure .pdf
                     they have the same vapour pressure               .pdf                     they have the same vapour pressure               .pdf
they have the same vapour pressure .pdfaesalem06
 
The elements As, Sb and Bi show no tendency to fo.pdf
                     The elements As, Sb and Bi show no tendency to fo.pdf                     The elements As, Sb and Bi show no tendency to fo.pdf
The elements As, Sb and Bi show no tendency to fo.pdfaesalem06
 
taking the distance from point P in water for len.pdf
                     taking the distance from point P in water for len.pdf                     taking the distance from point P in water for len.pdf
taking the distance from point P in water for len.pdfaesalem06
 
PH3 Phosphine H3N ammonia H3PO2 Hypophosphorus.pdf
                     PH3 Phosphine H3N ammonia H3PO2 Hypophosphorus.pdf                     PH3 Phosphine H3N ammonia H3PO2 Hypophosphorus.pdf
PH3 Phosphine H3N ammonia H3PO2 Hypophosphorus.pdfaesalem06
 
order is 3 and it is a linear .pdf
                     order is 3 and it is a linear                    .pdf                     order is 3 and it is a linear                    .pdf
order is 3 and it is a linear .pdfaesalem06
 
Nope. When an atom is ionized it only affects the.pdf
                     Nope. When an atom is ionized it only affects the.pdf                     Nope. When an atom is ionized it only affects the.pdf
Nope. When an atom is ionized it only affects the.pdfaesalem06
 
HOCl (aq) + HCI(aq) - H2O(l) + Cl2 (g) 6Cl2(g) +.pdf
                     HOCl (aq) + HCI(aq) - H2O(l) + Cl2 (g) 6Cl2(g) +.pdf                     HOCl (aq) + HCI(aq) - H2O(l) + Cl2 (g) 6Cl2(g) +.pdf
HOCl (aq) + HCI(aq) - H2O(l) + Cl2 (g) 6Cl2(g) +.pdfaesalem06
 
In Atmospehere Pressure = 105760 = 0.138 Atmo.pdf
                     In Atmospehere   Pressure = 105760 = 0.138 Atmo.pdf                     In Atmospehere   Pressure = 105760 = 0.138 Atmo.pdf
In Atmospehere Pressure = 105760 = 0.138 Atmo.pdfaesalem06
 
H2SO4 is a strong electrolyte. It dissociates alm.pdf
                     H2SO4 is a strong electrolyte. It dissociates alm.pdf                     H2SO4 is a strong electrolyte. It dissociates alm.pdf
H2SO4 is a strong electrolyte. It dissociates alm.pdfaesalem06
 
DE is positive in exothermic reactions .pdf
                     DE is positive in exothermic reactions           .pdf                     DE is positive in exothermic reactions           .pdf
DE is positive in exothermic reactions .pdfaesalem06
 
The yield to maturity (YTM) is the measure of bonds rate of return t.pdf
The yield to maturity (YTM) is the measure of bonds rate of return t.pdfThe yield to maturity (YTM) is the measure of bonds rate of return t.pdf
The yield to maturity (YTM) is the measure of bonds rate of return t.pdfaesalem06
 
TDS (Total Dissolved Solids ) is a measure of the combined content o.pdf
TDS (Total Dissolved Solids ) is a measure of the combined content o.pdfTDS (Total Dissolved Solids ) is a measure of the combined content o.pdf
TDS (Total Dissolved Solids ) is a measure of the combined content o.pdfaesalem06
 
magnesium oxide + water = magnesium hydroxideMgO (s) + H2O (l) =.pdf
magnesium oxide + water = magnesium hydroxideMgO (s) + H2O (l) =.pdfmagnesium oxide + water = magnesium hydroxideMgO (s) + H2O (l) =.pdf
magnesium oxide + water = magnesium hydroxideMgO (s) + H2O (l) =.pdfaesalem06
 
Meiosis, inheritance and variationThe uniqueness and similarities.pdf
Meiosis, inheritance and variationThe uniqueness and similarities.pdfMeiosis, inheritance and variationThe uniqueness and similarities.pdf
Meiosis, inheritance and variationThe uniqueness and similarities.pdfaesalem06
 
Inter-Process-Communication (or IPC for short) are mechanisms provid.pdf
Inter-Process-Communication (or IPC for short) are mechanisms provid.pdfInter-Process-Communication (or IPC for short) are mechanisms provid.pdf
Inter-Process-Communication (or IPC for short) are mechanisms provid.pdfaesalem06
 
B)120.0° note So3 is sp2-hybridized and adopts .pdf
                     B)120.0°  note So3 is sp2-hybridized and adopts .pdf                     B)120.0°  note So3 is sp2-hybridized and adopts .pdf
B)120.0° note So3 is sp2-hybridized and adopts .pdfaesalem06
 

More from aesalem06 (20)

#!binbash# Decode a UDP packet raw binary dataDonelet offs=40.pdf
#!binbash# Decode a UDP packet raw binary dataDonelet offs=40.pdf#!binbash# Decode a UDP packet raw binary dataDonelet offs=40.pdf
#!binbash# Decode a UDP packet raw binary dataDonelet offs=40.pdf
 
Youd only need SOCl2 So d then na .pdf
                     Youd only need SOCl2  So d then na             .pdf                     Youd only need SOCl2  So d then na             .pdf
Youd only need SOCl2 So d then na .pdf
 
you can see the difference bw IE5 and IE6 is ver.pdf
                     you can see the difference bw IE5 and IE6 is ver.pdf                     you can see the difference bw IE5 and IE6 is ver.pdf
you can see the difference bw IE5 and IE6 is ver.pdf
 
they have the same vapour pressure .pdf
                     they have the same vapour pressure               .pdf                     they have the same vapour pressure               .pdf
they have the same vapour pressure .pdf
 
The elements As, Sb and Bi show no tendency to fo.pdf
                     The elements As, Sb and Bi show no tendency to fo.pdf                     The elements As, Sb and Bi show no tendency to fo.pdf
The elements As, Sb and Bi show no tendency to fo.pdf
 
taking the distance from point P in water for len.pdf
                     taking the distance from point P in water for len.pdf                     taking the distance from point P in water for len.pdf
taking the distance from point P in water for len.pdf
 
PH3 Phosphine H3N ammonia H3PO2 Hypophosphorus.pdf
                     PH3 Phosphine H3N ammonia H3PO2 Hypophosphorus.pdf                     PH3 Phosphine H3N ammonia H3PO2 Hypophosphorus.pdf
PH3 Phosphine H3N ammonia H3PO2 Hypophosphorus.pdf
 
order is 3 and it is a linear .pdf
                     order is 3 and it is a linear                    .pdf                     order is 3 and it is a linear                    .pdf
order is 3 and it is a linear .pdf
 
Nope. When an atom is ionized it only affects the.pdf
                     Nope. When an atom is ionized it only affects the.pdf                     Nope. When an atom is ionized it only affects the.pdf
Nope. When an atom is ionized it only affects the.pdf
 
L2^12 .pdf
                     L2^12                                      .pdf                     L2^12                                      .pdf
L2^12 .pdf
 
HOCl (aq) + HCI(aq) - H2O(l) + Cl2 (g) 6Cl2(g) +.pdf
                     HOCl (aq) + HCI(aq) - H2O(l) + Cl2 (g) 6Cl2(g) +.pdf                     HOCl (aq) + HCI(aq) - H2O(l) + Cl2 (g) 6Cl2(g) +.pdf
HOCl (aq) + HCI(aq) - H2O(l) + Cl2 (g) 6Cl2(g) +.pdf
 
In Atmospehere Pressure = 105760 = 0.138 Atmo.pdf
                     In Atmospehere   Pressure = 105760 = 0.138 Atmo.pdf                     In Atmospehere   Pressure = 105760 = 0.138 Atmo.pdf
In Atmospehere Pressure = 105760 = 0.138 Atmo.pdf
 
H2SO4 is a strong electrolyte. It dissociates alm.pdf
                     H2SO4 is a strong electrolyte. It dissociates alm.pdf                     H2SO4 is a strong electrolyte. It dissociates alm.pdf
H2SO4 is a strong electrolyte. It dissociates alm.pdf
 
DE is positive in exothermic reactions .pdf
                     DE is positive in exothermic reactions           .pdf                     DE is positive in exothermic reactions           .pdf
DE is positive in exothermic reactions .pdf
 
The yield to maturity (YTM) is the measure of bonds rate of return t.pdf
The yield to maturity (YTM) is the measure of bonds rate of return t.pdfThe yield to maturity (YTM) is the measure of bonds rate of return t.pdf
The yield to maturity (YTM) is the measure of bonds rate of return t.pdf
 
TDS (Total Dissolved Solids ) is a measure of the combined content o.pdf
TDS (Total Dissolved Solids ) is a measure of the combined content o.pdfTDS (Total Dissolved Solids ) is a measure of the combined content o.pdf
TDS (Total Dissolved Solids ) is a measure of the combined content o.pdf
 
magnesium oxide + water = magnesium hydroxideMgO (s) + H2O (l) =.pdf
magnesium oxide + water = magnesium hydroxideMgO (s) + H2O (l) =.pdfmagnesium oxide + water = magnesium hydroxideMgO (s) + H2O (l) =.pdf
magnesium oxide + water = magnesium hydroxideMgO (s) + H2O (l) =.pdf
 
Meiosis, inheritance and variationThe uniqueness and similarities.pdf
Meiosis, inheritance and variationThe uniqueness and similarities.pdfMeiosis, inheritance and variationThe uniqueness and similarities.pdf
Meiosis, inheritance and variationThe uniqueness and similarities.pdf
 
Inter-Process-Communication (or IPC for short) are mechanisms provid.pdf
Inter-Process-Communication (or IPC for short) are mechanisms provid.pdfInter-Process-Communication (or IPC for short) are mechanisms provid.pdf
Inter-Process-Communication (or IPC for short) are mechanisms provid.pdf
 
B)120.0° note So3 is sp2-hybridized and adopts .pdf
                     B)120.0°  note So3 is sp2-hybridized and adopts .pdf                     B)120.0°  note So3 is sp2-hybridized and adopts .pdf
B)120.0° note So3 is sp2-hybridized and adopts .pdf
 

Recently uploaded

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 

Recently uploaded (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 

1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf

  • 1. 1. Malicious software : Chernobyl virus The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all computer data when an infected file is executed. Since many files are executed during computer use, the virus is able to spread quickly and infect those files. The Chernobyl virus is the first virus known to have the power to damage computer hardware. The activated viral strain attempts to erase the hard drive and overwrite the system's BIOS as well. The virus was detected as early as 1998, but its payload was first triggered April 16, 1999 - which was the 13th anniversary of the disaster at the Chernobyl nuclear reactor. Although U.S. and European computer users were affected, especially students and some businesses, most of Chernobyl's damage was wrought in Asia and the Middle East. Chernobyl actually is a variant of a virus known as CIH, the initials for the alleged author of the virus, Chen Ing-hau, a Taiwanese computer engineering student. CIH is sometimes referred to as a "space filler virus," referring to its ability to clandestinely take up file space on computers and prevent anti-virus software from running. 2. CHILD SOLICITING AND ABUSE : Child Soliciting and Abuse generally occurs when criminals solicit minors via chat rooms for the purpose of child pornography. Only 18% of youth use chat rooms, however, the majority of Internet-initiated sex crimes against children are initiated in chat rooms. In 82% of online sex crimes against minors, the offender used the victim's social networking site to gain information about the victim's likes and dislikes. At least 200 million girls and 100 million boys will be sexually victimized before they reach adulthood 3. IDENTITY THEFT: ABRAHAM ABDALLAH Abraham Abdallah was a high school dropout, but also ran one of the most elaborate internet- based identity theft schemes in recent history. The restaurant busboy was able to breach credit card companies, banks and other financial brokerages using the identities of some of the world’s richest people. According to the New York City Police Department, Abdallah was able to steal millions of dollars from people like movie director Steven Spielberg, CNN Founder Ted Turner, financier George Soros and billionaire Warren Buffet, all from a computer inside of a Brooklyn, New York City-based library. Abdallah successfully conned banks by posing to be financial representatives for many of these individuals. He was eventually monitored and arrested after the FBI received information from a financial institution that one of their clients did not request a large transfer of money. 4. HACKING: THE SONY PICTURES HACK
  • 2. A successful attack on Sony Pictures' computer systems threw the entire studio into disarray in late November. The hijackers' identity and motivation remain unclear, though in the days following the attack, evidence has surfaced to suggest it originated in North Korea. Rather than attempting to steal money or otherwise profit from the information it obtained, this hack seems to be focused on making life difficult for Sony Pictures employees. They have been subjected to threats from the hacking group, which has posted much of the data it collected from the studio's servers to the web. 5. CYBER STALKING: Cyberstalking refers to the crime of using the Internet, email, or other types of electronic communications to stalk, harass, or threaten another person. Cyberstalking most often involves sending harassing emails, instant or text messages, or social media posts, or creating websites for the sole purpose of tormenting the victim e Violence Against Women Act of 2000 placed cyberstalking under the prevue of federal law in the U.S. While many people find cyberstalking laws to be inadequate, state and federal legislatures point out that cyberstalking laws are fairly new and, as technology continues to grow and improve, so do the laws. Although specific laws vary, cyberstalking laws make it clear that this type of harassment is a criminal offense. A conviction for cyberstalking may result in a restraining order being issued, imprisonment,probation, fines, and restitution. Key factors to identifying cyberstalking cases include: False accusations. A cyberstalker often tries to damage the reputation of his victim by posting false information on social media websites or blogs. A perpetrator may even create fictitious websites or other accounts for the purpose of spreading false rumors and allegations about the victim. Gathering information about the victim. A cyberstalker may try to gather as much information as possible about the victim by interacting with the victim’s friends, family, and colleagues. In serious cases, a cyberstalker may hire a private investigator. Monitoring victim’s activities. A cyberstalker may attempt to trace his victim’s IP address, or hack into the victim’s social media accounts and emails to learn about his online activities. Encouraging others to harass the victim. The offender may encourage the involvement of third parties to harass the victim. False victimization. It is not uncommon for a cyberstalker to claim the victim is harassing him, taking the position of victim in his own mind. protecting from cyber stalking Save all emails, messages, and other communications for evidence. It is vital that these are not altered in any way, and that the electronic copies are kept, rather than only printouts. Save all records of threats against the victim’s safety or life. This includes any written or
  • 3. recorded threats, and logs of the date, time, and circumstances of verbal threats. Contact the perpetrator’s internet service provider. Internet service providers (ISP) prohibit their users from using their service to harass others. Contacting the ISP may result in discontinuation of the harasser’s internet service, and will put the ISP on notice to maintain record of the harasser’s internet use. Keep detailed records of contact with ISP and law enforcement officials. It is important to keep a log of all reports made to any agency or provider, and to obtain copies of the official reports when available. Solution 1. Malicious software : Chernobyl virus The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all computer data when an infected file is executed. Since many files are executed during computer use, the virus is able to spread quickly and infect those files. The Chernobyl virus is the first virus known to have the power to damage computer hardware. The activated viral strain attempts to erase the hard drive and overwrite the system's BIOS as well. The virus was detected as early as 1998, but its payload was first triggered April 16, 1999 - which was the 13th anniversary of the disaster at the Chernobyl nuclear reactor. Although U.S. and European computer users were affected, especially students and some businesses, most of Chernobyl's damage was wrought in Asia and the Middle East. Chernobyl actually is a variant of a virus known as CIH, the initials for the alleged author of the virus, Chen Ing-hau, a Taiwanese computer engineering student. CIH is sometimes referred to as a "space filler virus," referring to its ability to clandestinely take up file space on computers and prevent anti-virus software from running. 2. CHILD SOLICITING AND ABUSE : Child Soliciting and Abuse generally occurs when criminals solicit minors via chat rooms for the purpose of child pornography. Only 18% of youth use chat rooms, however, the majority of Internet-initiated sex crimes against children are initiated in chat rooms. In 82% of online sex crimes against minors, the offender used the victim's social networking site to gain information about the victim's likes and dislikes. At least 200 million girls and 100 million boys will be sexually victimized before they reach adulthood 3. IDENTITY THEFT: ABRAHAM ABDALLAH Abraham Abdallah was a high school dropout, but also ran one of the most elaborate internet-
  • 4. based identity theft schemes in recent history. The restaurant busboy was able to breach credit card companies, banks and other financial brokerages using the identities of some of the world’s richest people. According to the New York City Police Department, Abdallah was able to steal millions of dollars from people like movie director Steven Spielberg, CNN Founder Ted Turner, financier George Soros and billionaire Warren Buffet, all from a computer inside of a Brooklyn, New York City-based library. Abdallah successfully conned banks by posing to be financial representatives for many of these individuals. He was eventually monitored and arrested after the FBI received information from a financial institution that one of their clients did not request a large transfer of money. 4. HACKING: THE SONY PICTURES HACK A successful attack on Sony Pictures' computer systems threw the entire studio into disarray in late November. The hijackers' identity and motivation remain unclear, though in the days following the attack, evidence has surfaced to suggest it originated in North Korea. Rather than attempting to steal money or otherwise profit from the information it obtained, this hack seems to be focused on making life difficult for Sony Pictures employees. They have been subjected to threats from the hacking group, which has posted much of the data it collected from the studio's servers to the web. 5. CYBER STALKING: Cyberstalking refers to the crime of using the Internet, email, or other types of electronic communications to stalk, harass, or threaten another person. Cyberstalking most often involves sending harassing emails, instant or text messages, or social media posts, or creating websites for the sole purpose of tormenting the victim e Violence Against Women Act of 2000 placed cyberstalking under the prevue of federal law in the U.S. While many people find cyberstalking laws to be inadequate, state and federal legislatures point out that cyberstalking laws are fairly new and, as technology continues to grow and improve, so do the laws. Although specific laws vary, cyberstalking laws make it clear that this type of harassment is a criminal offense. A conviction for cyberstalking may result in a restraining order being issued, imprisonment,probation, fines, and restitution. Key factors to identifying cyberstalking cases include: False accusations. A cyberstalker often tries to damage the reputation of his victim by posting false information on social media websites or blogs. A perpetrator may even create fictitious websites or other accounts for the purpose of spreading false rumors and allegations about the victim. Gathering information about the victim. A cyberstalker may try to gather as much information as possible about the victim by interacting with the victim’s friends, family, and colleagues. In serious cases, a cyberstalker may hire a private investigator.
  • 5. Monitoring victim’s activities. A cyberstalker may attempt to trace his victim’s IP address, or hack into the victim’s social media accounts and emails to learn about his online activities. Encouraging others to harass the victim. The offender may encourage the involvement of third parties to harass the victim. False victimization. It is not uncommon for a cyberstalker to claim the victim is harassing him, taking the position of victim in his own mind. protecting from cyber stalking Save all emails, messages, and other communications for evidence. It is vital that these are not altered in any way, and that the electronic copies are kept, rather than only printouts. Save all records of threats against the victim’s safety or life. This includes any written or recorded threats, and logs of the date, time, and circumstances of verbal threats. Contact the perpetrator’s internet service provider. Internet service providers (ISP) prohibit their users from using their service to harass others. Contacting the ISP may result in discontinuation of the harasser’s internet service, and will put the ISP on notice to maintain record of the harasser’s internet use. Keep detailed records of contact with ISP and law enforcement officials. It is important to keep a log of all reports made to any agency or provider, and to obtain copies of the official reports when available.