External threats to information system:
Malicious software and computer crimes
Name ID
Souman Guha 16241002
Sazzad Hossain Khan 16241008
Samiha Afreen 16241020
Rasheek Tabassum Mujib 16241040
Rakib Hasan Anik 16241072
Syed Tahmid Najib 16241084
Group 1
Introduction
Disruption of Computer or Internet based intensive information
Two sources: Internal and External
Two major concerns of external sources: Virus and Computer crimes
Attacks may result in: slow network performance, non-availability of a
particular website, inability to access any website and most importantly
different types of financial fraudulent
So, Securing information system is a top notch priority for any organization’s
management these days.
External Threats to Information System
An external threat is a threat, originating outside a company, government
agency, or institution
A threat refers to anything that has the potential to cause serious harm to a
computer system.
The systems are vulnerable to threats because of accessibility of networks,
hardware problems, software problems, disasters, use of networks/computers
outside firm’s control, loss and theft of portable devices etc
Mainly malware and computer crimes are the malicious software that mostly
threats the information
Malicious Software & Computer crimes
• Malware is any software that brings harm to a computer system. Malware is often
downloaded when people open an infected email attachment or click a suspicious
link in an email.
• Malware can be in the form of Worms, Viruses, Trojans, Spyware, Adware and
Rootkits etc., which steal protected data, delete documents and causes other harms
to the computer.
• Criminals may use malicious software (or malware) to monitor anyone’s online
activity and cause damage to the computer.
Different Types of Malware
Virus SpywareTrojan HorseWorms
Ransomware
SQL
Injection
attacks
Virus
backdoors
Rootkit
• A virus is the most common type of malware, and it's defined as a
malicious program that can execute itself and spreads by infecting
other programs or files.
• A virus is a small piece of software that piggybacks on real programs in
order get executed
• Once it’s running, it spreads by inserting copies of itself into other
executable code or copies of itself into other executable code or
documents
I-LOVE-YOU VIRUS
YERAR OF ATTACK: 2000
OPERATING SYSTEM:
WINDOWS
AFFECTED SYSTEMS: 45
MILLION
MAKER:REONEL RAMONES &
ONEl DE GUZMAN
MELISSA VIRUS
• It may be someone you know. But they don’t
know they sent it
• The subject line will read, “Important
Message From” and the name may be
someone you know
• The body of the mail will read “Here is that
document you asked for don’t show anyone
else ;-)”
• The attachment where this nasty little bug
lives, has the name of list.doc.
Different Types of Malware (cont.)
• Worms-
A type of malware that can self-replicate without a host program and spreads
without any human interaction.
Example: MyDoom.A, Sobig.F, Sasser.ftp
• Trojan horse-
It is a malicious program that is designed to appear as a legitimate program and
after installation can execute malicious functions.
Examples: Stormware, The Zeus
Different Types of Malware (cont.)
• Spyware-
A kind of malware that is designed to collect information and data on users and observe
their activity without users' knowledge.
Example: KeyLoggers
• Ransomware-
A ransomware is designed to infect a user's system and encrypt the data. The cyber
criminal receives a ransom payment for the illegal act.
Example: Hacking through ransomware (UK), WannaCry virus (NHS)
• Rootkit-
It is a type of malware designed to obtain administrator-level access to the victim's
system. After installation it privileges access to the victim’s computer system.
Examples: Kernel-mode Rootkit, Firmware Rootkit etc.
Different Types of Malware (cont.)
• Virus back doors-
A malicious program that secretly creates a backdoor into an infected system that
allows threat actors to remote access it without alerting the user or the system's
security programs.
Example: FinSpy
• SQL Injection attacks-
It forces a database to yield otherwise secure information by causing it to confuse
classified data, such as passwords or blueprints, with information that is for public
consumption, such as product details or contacts.
A typical eStore SQL database query may look like the following:
SELECT - ItemName, ItemDescription
FROM - Item
WHERE - ItemNumber = ItemNumber
Some Dangerous Hacking Incidents-
1.Markus Hess hacks-
A German citizen, is best known for his
endeavors as a hacker in the late 1980s.
• Hacked into networks in US, Europe and
East Asia.
• Sold the information to KGB for $54,000.
• Broken into 400 U.S military computers.
• Materials included sensitive semiconductor,
satellite, space and aircraft technologies.
2. Hackers steal $650 Million-
A group of Russian-based hackers managed to gain access to secure
information from more than 100 institutions around the world. The
cyber criminals used malware to infiltrate banks' computer systems
and gather personal data. They were then able to impersonate online
bank staff to authorize fraudulent transfers, and even order ATM
machines to dispense cash without a bank card. It was estimated that
around £650 million was stolen from the financial institutions in total.
3. JP and Morgan Chase & Co target of giant hacking
conglomerate, 2015-
Late in 2015, three men were charged with stealing data
from millions of people around the world, as part of a
hacking conglomerate.
• Targeted major corporations including JP Morgan.
• Stole information from 83 million customers of JPM.
• Made hundreds of millions of dollars in illegal profits.
• Stole information that allowed them to manipulate
stock prices.
• able to facilitate large scale payment processing for
criminals, an illegal bit coin exchange, and the
laundering of money through approximately 75 shell
companies.
.
4. Sony Pictures crippled by GOP hackers, 2014-
• Hit with a crippling virus.
• Guardians of Peace (GOP) behind the apparent
blackmail attempt.
• 100 terabytes of sensitive data stolen.
• North Korea’s disapproval of the film, “The
Interview”.
• US government agencies investigated that North
Korea had authorized the cyber-attack in an
attempt to prevent the film from being released.

External threats-to-information-system

  • 1.
    External threats toinformation system: Malicious software and computer crimes
  • 2.
    Name ID Souman Guha16241002 Sazzad Hossain Khan 16241008 Samiha Afreen 16241020 Rasheek Tabassum Mujib 16241040 Rakib Hasan Anik 16241072 Syed Tahmid Najib 16241084 Group 1
  • 3.
    Introduction Disruption of Computeror Internet based intensive information Two sources: Internal and External Two major concerns of external sources: Virus and Computer crimes Attacks may result in: slow network performance, non-availability of a particular website, inability to access any website and most importantly different types of financial fraudulent So, Securing information system is a top notch priority for any organization’s management these days.
  • 4.
    External Threats toInformation System An external threat is a threat, originating outside a company, government agency, or institution A threat refers to anything that has the potential to cause serious harm to a computer system. The systems are vulnerable to threats because of accessibility of networks, hardware problems, software problems, disasters, use of networks/computers outside firm’s control, loss and theft of portable devices etc Mainly malware and computer crimes are the malicious software that mostly threats the information
  • 5.
    Malicious Software &Computer crimes • Malware is any software that brings harm to a computer system. Malware is often downloaded when people open an infected email attachment or click a suspicious link in an email. • Malware can be in the form of Worms, Viruses, Trojans, Spyware, Adware and Rootkits etc., which steal protected data, delete documents and causes other harms to the computer. • Criminals may use malicious software (or malware) to monitor anyone’s online activity and cause damage to the computer.
  • 6.
    Different Types ofMalware Virus SpywareTrojan HorseWorms Ransomware SQL Injection attacks Virus backdoors Rootkit
  • 8.
    • A virusis the most common type of malware, and it's defined as a malicious program that can execute itself and spreads by infecting other programs or files. • A virus is a small piece of software that piggybacks on real programs in order get executed • Once it’s running, it spreads by inserting copies of itself into other executable code or copies of itself into other executable code or documents
  • 9.
    I-LOVE-YOU VIRUS YERAR OFATTACK: 2000 OPERATING SYSTEM: WINDOWS AFFECTED SYSTEMS: 45 MILLION MAKER:REONEL RAMONES & ONEl DE GUZMAN
  • 10.
    MELISSA VIRUS • Itmay be someone you know. But they don’t know they sent it • The subject line will read, “Important Message From” and the name may be someone you know • The body of the mail will read “Here is that document you asked for don’t show anyone else ;-)” • The attachment where this nasty little bug lives, has the name of list.doc.
  • 11.
    Different Types ofMalware (cont.) • Worms- A type of malware that can self-replicate without a host program and spreads without any human interaction. Example: MyDoom.A, Sobig.F, Sasser.ftp • Trojan horse- It is a malicious program that is designed to appear as a legitimate program and after installation can execute malicious functions. Examples: Stormware, The Zeus
  • 12.
    Different Types ofMalware (cont.) • Spyware- A kind of malware that is designed to collect information and data on users and observe their activity without users' knowledge. Example: KeyLoggers • Ransomware- A ransomware is designed to infect a user's system and encrypt the data. The cyber criminal receives a ransom payment for the illegal act. Example: Hacking through ransomware (UK), WannaCry virus (NHS) • Rootkit- It is a type of malware designed to obtain administrator-level access to the victim's system. After installation it privileges access to the victim’s computer system. Examples: Kernel-mode Rootkit, Firmware Rootkit etc.
  • 13.
    Different Types ofMalware (cont.) • Virus back doors- A malicious program that secretly creates a backdoor into an infected system that allows threat actors to remote access it without alerting the user or the system's security programs. Example: FinSpy • SQL Injection attacks- It forces a database to yield otherwise secure information by causing it to confuse classified data, such as passwords or blueprints, with information that is for public consumption, such as product details or contacts. A typical eStore SQL database query may look like the following: SELECT - ItemName, ItemDescription FROM - Item WHERE - ItemNumber = ItemNumber
  • 15.
    Some Dangerous HackingIncidents- 1.Markus Hess hacks- A German citizen, is best known for his endeavors as a hacker in the late 1980s. • Hacked into networks in US, Europe and East Asia. • Sold the information to KGB for $54,000. • Broken into 400 U.S military computers. • Materials included sensitive semiconductor, satellite, space and aircraft technologies.
  • 16.
    2. Hackers steal$650 Million- A group of Russian-based hackers managed to gain access to secure information from more than 100 institutions around the world. The cyber criminals used malware to infiltrate banks' computer systems and gather personal data. They were then able to impersonate online bank staff to authorize fraudulent transfers, and even order ATM machines to dispense cash without a bank card. It was estimated that around £650 million was stolen from the financial institutions in total.
  • 17.
    3. JP andMorgan Chase & Co target of giant hacking conglomerate, 2015- Late in 2015, three men were charged with stealing data from millions of people around the world, as part of a hacking conglomerate. • Targeted major corporations including JP Morgan. • Stole information from 83 million customers of JPM. • Made hundreds of millions of dollars in illegal profits. • Stole information that allowed them to manipulate stock prices. • able to facilitate large scale payment processing for criminals, an illegal bit coin exchange, and the laundering of money through approximately 75 shell companies. .
  • 18.
    4. Sony Picturescrippled by GOP hackers, 2014- • Hit with a crippling virus. • Guardians of Peace (GOP) behind the apparent blackmail attempt. • 100 terabytes of sensitive data stolen. • North Korea’s disapproval of the film, “The Interview”. • US government agencies investigated that North Korea had authorized the cyber-attack in an attempt to prevent the film from being released.