Cyber crimes are on the rise as companies and individuals connect to the internet. While connectivity provides benefits, it also increases vulnerabilities to threats like hacking, viruses, and data theft. The document outlines the history of computer crimes and defines different types like fraud, forgery, and unauthorized access. It discusses hacking techniques such as using trapdoors, decoys, and call forwarding to intercept systems. The conclusion emphasizes the importance of security measures like passwords, antivirus software, and incident response teams to help prevent and address cyber crimes.
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Internet and computers have changed working, communication, meeting and business requirements and conditions all over globe. Due to this high profile technology, everyone can share any activity that was unexpected and unimaginable few decades back. It was the imagination of people that they will live their lives in this manner and do their business quickly and imagination and dream has come true with the introduction of internet only. Modern society is now associated with internet and related technologies, over a quarter of the world's population is wired into the net and this number is growing every day
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Internet and computers have changed working, communication, meeting and business requirements and conditions all over globe. Due to this high profile technology, everyone can share any activity that was unexpected and unimaginable few decades back. It was the imagination of people that they will live their lives in this manner and do their business quickly and imagination and dream has come true with the introduction of internet only. Modern society is now associated with internet and related technologies, over a quarter of the world's population is wired into the net and this number is growing every day
Cyber Security is a crucial and rising part of concern in the present age with a rapid increase in the graph of digitization. And with an increase in the activities in cyberspace, there is also an increase in the cyber-crimes. Handling the huge volumes of data with security has become an inevitable need of the hour. Antivirus software, Firewalls, and other technological solutions help to secure this data but are not sufficient enough to prevent the cybercrooks from destructing the network and stealing confidential information. This paper mainly focuses on the issues and challenges faced by cybersecurity. It also discusses the risks, cybersecurity techniques to curb cyber-crime, cyber ethics, and cyber trends.
Time is now changing faster, it was started with Green Revolution, White Revolution and now it’s time for Data Revolutions. It means Cyber War; in today’s world AI is replacing human beings. A research says that more than 80% work is depending upon AI. Due to this cyber crimes and threats are also increased.
Technology development is a necessity. Information and Communication Technology is a large dome of terminology that includes all technical equipment for processing and conveying information. It has also caused the world's relationships to be unconstrained. It's here and now means it's somewhere else and now. In every line of technological life present that contributes its role to the desired coveted will be better. That dream is in fact two blades facing each other. In the body of one knife exactly each other. On the one hand technology contributes to the improvement of welfare, progress, and human civilization. Furthermore, on the other hand, technology can be an instrument in the act against the law. With human information technology then likes getting a vehicle to burst its criminal lust. Criminal crime by taking technology as a medium, then manifested in various forms. These forms include hacking, cracking, and so on. Do not be surprised if for example your balance arrives – suddenly reduced, or the bank hundreds of millions in
Crimes that use computer networks or devices to advance other ends include: Fraud and identity theft (although this increasingly uses malware, hacking or phishing, making it an example of both "computer as target" and "computer as tool" crime) Information warfare. Phishing scams.
Cyber Security is a crucial and rising part of concern in the present age with a rapid increase in the graph of digitization. And with an increase in the activities in cyberspace, there is also an increase in the cyber-crimes. Handling the huge volumes of data with security has become an inevitable need of the hour. Antivirus software, Firewalls, and other technological solutions help to secure this data but are not sufficient enough to prevent the cybercrooks from destructing the network and stealing confidential information. This paper mainly focuses on the issues and challenges faced by cybersecurity. It also discusses the risks, cybersecurity techniques to curb cyber-crime, cyber ethics, and cyber trends.
Time is now changing faster, it was started with Green Revolution, White Revolution and now it’s time for Data Revolutions. It means Cyber War; in today’s world AI is replacing human beings. A research says that more than 80% work is depending upon AI. Due to this cyber crimes and threats are also increased.
Technology development is a necessity. Information and Communication Technology is a large dome of terminology that includes all technical equipment for processing and conveying information. It has also caused the world's relationships to be unconstrained. It's here and now means it's somewhere else and now. In every line of technological life present that contributes its role to the desired coveted will be better. That dream is in fact two blades facing each other. In the body of one knife exactly each other. On the one hand technology contributes to the improvement of welfare, progress, and human civilization. Furthermore, on the other hand, technology can be an instrument in the act against the law. With human information technology then likes getting a vehicle to burst its criminal lust. Criminal crime by taking technology as a medium, then manifested in various forms. These forms include hacking, cracking, and so on. Do not be surprised if for example your balance arrives – suddenly reduced, or the bank hundreds of millions in
Crimes that use computer networks or devices to advance other ends include: Fraud and identity theft (although this increasingly uses malware, hacking or phishing, making it an example of both "computer as target" and "computer as tool" crime) Information warfare. Phishing scams.
Each technological age has been marked by a shift in how the industrial platform enables companies to rethink their business processes and create wealth. In the talk I argue that we are limiting our view of what this next industrial/digital age can offer because of how we read, measure and through that perceive the world (how we cherry pick data). Companies are locked in metrics and quantitative measures, data that can fit into a spreadsheet. And by that they see the digital transformation merely as an efficiency tool to the fossil fuel age. But we need to stretch further…
What are the biggest threats to a network in terms of security and w.pdfinfo309708
What are the biggest threats to a network in terms of security and why?
Describe what you would do to protect a network from attack, mention any appliances or
products you
can recommend.
Solution
Network security is the major part of a network that needs to be mentained as various important
information is being passed from the various systems.And is very vulnerable to attack.The
biggest threats are as follows:
1) Viruses and warms
The after-effects of viruses are so dangerous that they take second place. The vulnerability here
is the back doors viruses leave in their wake, or the chinks in the corporate armour that later
generations of code can exploit.
the worms that turn PCs into remote mail servers and send cascading volumes of e-mails that
cause denial of service attacks. These attacks are becoming more sophisticated.
2) Trozen Horses
Trojan is any malicious computer program which is used to hack into a computer by misleading
users of its true intent
3)Phishing:
Phishing, or identity theft, is most commonly targeted at bank customers but everybody should
be alert to it. The bank users receive an e-mail as if from the bank asking for their log-on and
password and, according to risk specialist company mi2g, less than half of 1% of customers
oblige, a significant figure if millions of e-mails are sent.
4) Password Attack
Password attacks are the classic way to gain access to a computer system is to find out the
password and log in. The growth of the Internet has created unlimited opportunity for these
intruders to steal secrets, tinker with Web sites, abscond with credit card information, or just
generally make mischief
5)Shared Computers
When computer are shared it create a LAN type network which shares all the various
information by the users and the informtio can easiy access by any one at that time.It is not
secure .
Security in NETWORK is a MYTH.
A denial of service attack might be thwarted if the security system recognises high levels of a
particular sort of traffic before they become so high the network falls over..
Type of Security Threats and its Preventionijsrd.com
Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The term online system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The basic aim of this article is to Prevention against unauthorized security Attack and Threats.
This is for educational purposes only and not to be used as a means to scam or attack.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
Cybercrimes
1. CYBER CRIMES
1. INTRODUCTION:
Today an increasing number of companies are connecting to the
Internet to support sales activities or to provide their employees and customers
with faster information and services.
The virtual world has taken over the real one, E-business and E-
commerce, which are the new mantras and electronic transactions and
dominate the overall business paradigm. In this rapidly evolving e-world that
depends on free flowing information, security is the major problem to be
considered.
Security on Internet is challenging. Security on an Internet is
important because information has significant value. Implementing security
involves assessing the possible threats to one’s network, servers and information.
The goal is then to attempt to minimize the threat as much as possible.
This developing world of information technology has a negative
side effect. It has opened the door to antisocial and criminal behavior.
1.1 The Computer Dependent Age:
The modern world relies on computerized system for almost
every thing in the life, from air, train and bus traffic control to medical
services. Systems
on co paradise human lives. The society depends on computer system,
therefore has profound human dimension too.
The rapid expansion of large-scale computer networks and the
ability to access systems through regular telephone lines increase the
vulnerability to these systems. And it also increases the opportunity for misuse
or criminal activity.
Security is needed for both external and internal threats.
2. 1.2 History of computer crimes:
It is difficult to determine when the first crime involving a
computer actually took place. The computer has been around in some form
since the abacus, which is known to exist in 3500BC in Japan, China, and
India.
In 1801, profit motives encouraged Joseph Jacquard, a textile
manufacturer in France, to design the forerunner of the computer card. This
device allowed the repetition of services of stamps in the weaving of special
fabrics. However Jacquard’s employees were committed to discourage further
use of new technology.
1.3 Definition of computer crimes:
Experts debated on what exactly constitutes computer crime or a
computer related crime. Even after several years there is no internationally
recognized definition of these terms. A global definition of computer crime has
not been achieved. Computer crime has been defined as “any illegal unethical
or unauthorized behavior involving automatic processing or transmission of
data”.
Threats come in two categories:
1. Passive threats.
2. Active threats.
Passive threats:
This involves monitoring the transmission data of an
organization.
Here the goal of the assembler if to obtain information that is being
transmitted. Passive threats are difficult to detect because they do not
involve alterations of data. These are of two types:
a. Release of message content.
b. traffic analysis.
3. Active threats:
These threats involve some modification of data stream or the
creation of a false stream. These are of three types:
a. Modification.
b. Denial of message service.
c. Masquerade.
2. TYPES OF CYBER CRIMES:
2.1 Fraud by computer manipulation:
Intangible assets represented in data format such as money
on deposits or hours of work are the most common targets related to
fraud.
Modern business is quickly replacing cash with deposits
transacted on computer system creating computer fraud. Credit card
information as well as personal and financial information on credit card
has been frequently targeted by organized criminal crimes. Assets
represented in data format often have a considerably higher value than
traditionally economic assets resulting in potentially greater economic
class.
2.2 Computer Forgery:
This happens when data is altered which is stored in
documents that are in computerized form. Computers however can also
be used as instruments for committing forgery. A new generation of
fraudulent alteration or duplication emerged when computerized color
laser copies became available.
These copies are capable of high-resolution copying,
modification of documents that are even creating false documents without
4. benefit of original. They produce documents with an equality that is
indistinguishable from original documents.
Experts can only distinguish this.
The widespread of computer networks is the need for
people with common and shared interest to communicate with each other.
Information can easily be represented and manipulated in electronic form.
To meet the needs of sharing and communicating information, the
computers need to be connected which is called data communication
network.
2.3 Damage to Data/Programs:
This category of criminal activity involves either direct or
search unauthorized access to computer system by introducing new
programs known as viruses, worms or logic bombs. The unauthorized
modification suppression or erasure of computer data or functions with
the Internet to hinder normal functioning of the system is clearly a
criminal activity and is commonly referred to as computer sabotage.
VIRUS: (Vital information resources under seize).
Virus is a series of program codes with the ability to attach
itself to legitimate programs and propagate itself to other computer
programs. Viruses are file viruses and bootsector viruses.
It attacks the fat so that there is no sequence of file content and it destroys
the data content.
WORMS: (Write Once Read Many).
They are just added to the files and they do not
manipulate. It differs from a virus in that it does not have the ability to
replicate itself.
5. LOGIC BOMB:
As it involves the programming the destruction or
modification of data is at a specific time in the future.
2.4 Unauthorized access:
The desire to gain unauthorized access to computer system
can be prompted by several motives:
1. From simple curiosity.
2. To computer sabotage.
International unjustified access by a person not authorized
by the owners or operators of a system may often constitute criminal
behavior.
Unauthorized access creates the opportunity to cause
additional unintended damage to data and system crashes. Accessing is
often accomplished from a remote location along a telecommunication
network by one of several means. The intruder may be able to take
advantage of security measures to gain access or may find loopholes in
existing security measures or system procedures. Frequently hackers
impersonate legitimate users. This is especially common in systems.
3. PRECAUTIONS TO PREVENT COMPUTER HACKING:
Nobody’s data is completely safe. But everybody’s
computers can still be protected against would-be hackers. Here is your
defense arsenal.
3.1 Firewalls:
These are the gatekeepers to a network from the outside.
Firewall should be installed at every point where the computer system
6. comes in contact with other networks, including the Internet a separate
local area network at customer’s site or telephone company switch.
3.2 Password protection:
At minimum, each item they logon, all PC users should
be required to type-in password that only they and network administrator
know. PC users should avoid picking words, phrases or numbers that
anyone can guess easily, such as birth dates, a child’s name or initials.
Instead they should use cryptic phrases or numbers that combine
uppercase and lowercase.
Letters such as the “The Moon Also Rises”. In addition the
system should require all users to change passwords every month or so
and should lockout prospective users if they fail to enter the correct
password three times in a row.
3.3 Viruses:
Viruses generally infect local area networks through
workstations. So anti-virus software that works only on the server isn’t
enough to prevent infection.
You cannot get a virus or any system-damaging software
by reading e-mail. Viruses and other system-destroying bugs can only
exist in files, and e-mail is not a system file. Viruses cannot exist there.
Viruses are almost always specific of the operating system involved.
Meaning, viruses created to infect DOS application can do no damage to
MAC systems, and vice versa. The only exception to this is the Microsoft
Word “macro virus” which infects documents instead of the program.
3.4 Encryption:
Even if intruders manage to break through a firewall, the
data on a network can be made safe if it is encrypted. Many software
7. packages and network programs – Microsoft Windows NT, Novel
NetWare, and lotus notes among others- offer and – on encryption
schemes that encode all the data sent on the network. In addition,
companies can buy stand alone encryption packages to work with
individual applications. Almost every encryption package is based on an
approach known as public-private key.
Scrambled data is encoded using a secret key unique to
that transmission. Receiver’s use a combination of the sender’s public
key and their own private encryption key to unlock the secret code for
that message decipher it.
3.5 Audit Trails:
Almost all firewalls, encryption programs, and password
schemes include an auditing function that records activities on the
network.
This log which, ironically is turned off by many network
administrators who doesn’t appreciate its importance is an excellent way
of recording what occurred during an attack by hackers.
4. HOW TO AVOID GETTING HACKED:
Get licensed anti-virus software and one must update them
regularly. Most good anti-virus software offers on-line updating.
There are some teams of people who have been formed to
assist in solving hacker attacks and to disseminate information on
security attacks. Two such teams are:
1. CERT (Computer Emergency Response Team).
2. FIRST (Forum of Incident Response and Security
Teams).
Here are some points by which one can reduce the danger
of getting hacked:
8. a. Do not accept files from unknown sources if the files are sent
as an attachment or sent to you while your are chatting.
b. Do not download any executable files from unknown sources.
c. Do not simply accept files even if it is from known sources.
This is due to the fact that the latest virus could send itself as an
attachment from an infected computer. It would be from your
known sources.
d. Constantly change your password. Use alphanumeric and
special characters whenever possible. Never use your name,
birth dates or words that are easily traced.
5. HACKING TECHNIQUES:
5.1 Callback units:
Callback units are a good security device, but with most
phone systems, it is quite possible for the hacker to use the following
steps to get around a callback unit that uses the same phone line for both
incoming and outgoing calls: First, he calls the callback unit and enters
any authorized ID code. After he enters this ID, the hacker holds the
phone line open; he does not hand up. When the callback unit picks up
the phone to call the user back, the hacker is there, waiting to meet it.
The ID code is simple for a hacker to obtain, because
these codes are not meant to be security precautions. The callback unit
itself provides security by keeping incoming calls from reaching the
computer. The ID codes are no more private than most telephone
numbers. Some callback units refer to the codes as “location
identification numbers” and some locations are used by several different
people, so their Ids are fairly well known. In some cases, callback units
also have certain simple codes that are always defined by default. Once
the hacker has entered an Id code and the callback unit has picked up the
phone to re-call him. The hacker may or may not decide to provide a dial
tone to allow to “thinking” if it is calling the correct number.
9. 5.2 Trapdoors as a possibility:
A trapdoor is a set of special instructions embedded in
the large program that is the operating system of a computer. A
permanent, hopefully secret “doorway “, these special instruments enable
anyone who knows about them to bypass normal security procedures and
to gain access to the compote’s files. Although they may sound sinister,
hackers did not invent trapdoors, although existing ones are certainly
used by hackers who find out them.
5.3 The Decoy:
One of the more sophisticated hacking tools is known as
the decoy. It requires that hacker an account on the system. The hacker
with a low-security account tries this method to get higher-security
account. He will first use his low-security account to write a program that
will emulate the log-on procedures of the systems.
1. Clear the terminal screen and place text on it that makes
every thing look as if the system is in charge.
2. Prompt for, and allow the user to enter both an account name
and a password.
3. Save that information in a place the hacker can access.
4. Tell the user the account/password entries are not
acceptable.
5. Turn control of the terminal back over to the system.
5.4 Intercept:
Holding the line will only work with callback units that
use the same phone lines to call in and to call out. Some callback units
use different incoming and outgoing lines, numbers 555-4820 through
555-3830 are dedicated to users incoming calls and lines 555-2020
through 555-2030 are dedicated to the computers outgoing calls. The only
thing a hacker needs in order to get through to these systems is a
computer and a little time- he does not even need an ID code.
10. First, the hacker calls any one of the outgoing phone lines,
which of course, will not answer, sooner, or later, though, while the
hacker has his computer waiting there, listening to the ring, an authorized
user will call one of the incoming lines and request to be called back. It
will usually be less than an hours wait, but the hacker’s computer is
perfectly capable of waiting for days, if need be.
5.5 Call Forwarding:
Many people use call forwarding by special arrangement
with the Phone Company. When a customer requests for a call
forwarding, the Phone Company uses its computer to forward all
customers incoming calls to another number. Let us say for example, that
you want calls that come to your office phone to be forwarded to your
phone. A call from you to the Phone Company, some special setting in
the phone company computer, and all calls to your home instead. This
little bit of help from Phone Company is another tool used by hacker.
5.6 Rapid fire:
Memory location manipulation can be helpful, but there is
another more powerful possibility in some case, the Rapid-fire method.
To understand how this method works, you have to know something
about the way operating system works. When a user enters a command,
the operating system first places the command in a holding area, the
buffer, where it will sit for a few millionths of a second. The system
looks at the command and says “Does this person really have
authorization to do this, or not?” Then the command sits there a few
millionths of a second while the system runs off to check the user’s
authentication, when the system comes back to the command it will have
one of the two possible answers: “ok, go ahead” or “sorry, get permission
first”.
Once you are on a system that handles things like this, you
can use the rapid-fire method to change the command while it is sitting in
the buffer, waiting to be executed. If you can do this, you can do
anything. You can enter a command that you know will be approved,
11. such as “tell me the time”. As soon as the system runs off to verify your
right to know the time, you can change the command in the buffer to
something you know would not be approved, “give me the list of all the
passwords”, when the system comes back with the “ok, go ahead”, it
responds to the second command, not the first one. Of course, this
exchange has to be done very rapidly, but more systems existing today
can be fooled by this trick.
6. CONCLUSION:
The issue of network and Internet security has become
increasingly more important as more and more business and people go
on-line.
To avoid the information from hackers we use the
passwords secretly and we change the passwords regularly. We cannot
use our names, initials as passwords that are easily traced. We should not
download any executable files from unknown sources, information from
any sources without checking for virus. We have to use licensed anti-
virus software. Also teams like CERT and FIRST assist in solving hacker
attacks and to disseminate information on security.
7. BIBLIOGRAPHY:
Computers Today.
Web Commerce Technology.