1 / 11

Computer Crimes

Computer Crimes. Cyber Crimes. Today criminals are doing everything from stealing intellectual property and committing frauds to unleashing viruses and committing acts of cyber terrorism. Computer Crimes.

becka
Télécharger la présentation

Computer Crimes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Crimes

  2. Cyber Crimes • Today criminals are doing everything from stealing intellectual property and committing frauds to unleashing viruses and committing acts of cyber terrorism.

  3. Computer Crimes • Unauthorized use, access, modification, destruction of hardware, software, data or network resources. • Unauthorized release of information. • Unauthorized copying of software's.

  4. Case Study • PayPal Inc (www.paypal.com) • John Kothanek, PayPal lead investigator discovered that 40 or more accounts were created by 10 names and they used to buy goods fromebay.com • He set a sniffer software to catch packet traffic at the mock site. • Using tolls TraceRoute and Sam Spade, PayPal found the fake PayPal server address in Russia.

  5. Hacking • Unauthorized use of Computer or Network or Resources of IT.

  6. Common Hacking Tactics • Denial of Service • Hammering too many requests… • Scans • Sniffer • Search individual packets of data as they pass through Internet, capturing passwords or entire contents. • Spoofing • Faking an email address or Web Page to trick users into passing along critical information's like passwords or credit card numbers.

  7. Common Hacking Tactics • Trojan Horse • Back Doors • Few hidden ways to make reentry. • Malicious Applets • Misuses the computer resources, modify files, send fake emails, steal passwords. • War Dialing • Programs that automatically dial numbers. • Logic Bombs • Instruction in the computer program that triggers a malicious act

  8. Common Hacking Tactics • Buffer Overflow • Sending to much data • Replicating the data • Password Crackers • Social Engineering • Tactic used to gain the Companies Information • Dumpster Diving • Company’s garbage to find the information

  9. Internet abuses at workplace • General email abuses • Unauthorized usage and access • Plagiarism – copying logos, website, softwares • Newsgroup posting • Transmission of confidential data • Pornography • Hacking • Non work related download • Leisure use of Internet • Moonlighting

  10. Top five Virus family • MyDoom • Netsky • SoBig • Klez • Sasser

  11. Case Study – Etrade Financial Corp • Online Stock Broker • Has 3.5 million customers • More than 100000 trades per day • Trades are completed in a second, that spans multiple computers, routers, application not all controlled by Etrade. • $70 million exchanges takes place per day.

More Related