1 / 27

Borrowed by Tate

Cyber Crimes & Computer Viruses. Borrowed by Tate. Computer Crimes ( Cyber Crimes). Cyber crime encompasses any criminal act dealing with computers and networks. Computer Crimes ( Cyber Crimes).

stefanc
Télécharger la présentation

Borrowed by Tate

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Crimes & Computer Viruses Borrowed by Tate

  2. Computer Crimes ( Cyber Crimes) Cyber crime encompasses any criminal act dealing with computers and networks Borrowed by Tate

  3. Computer Crimes ( Cyber Crimes) Cybercrime is a growing concern for both law enforcement officials and consumers as a result of the rapid expansion of the Internet into all forms of business and commerce. All aspects of the Internet are vulnerable to such activities, including the World Wide Web, e-mail, chat rooms, and newsgroups. DCFM

  4. Types of Cyber Criminals • Unauthorized access by insiders. • System penetration by outsiders. • Theft of proprietary information. • Financial fraud using computers. • Sabotage of data or networks. • Disruption of network traffic (e.g., denial of service attacks) DCFM

  5. Types of Cyber Criminals Cont... • Creation and distribution of computer viruses. • Software piracy. • Identity theft. • Hardware theft (e.g., laptop theft). • The most common types of cybercrime experienced by companies were virus infection, insider abuse of network resources, and unauthorized access by insiders. DCFM

  6. Types of Cyber Crimes • Viruses • Worms • Trojans • Hoaxes • Mail bombs • Threats • Harassment • Stalking • Fraud • Theft • Forgery • Piracy • Break-ins • Terrorism DCFM

  7. Hackers Hackers are programmers. They should have the knowledge of advanced technology of operating systems and programming languages, and they may know of holes within systems and the reasons for such holes. They constantly seek further knowledge, freely share what they have discovered, and never, ever intentionally damage data. DCFM

  8. Crackers • A Crackeris a person who breaks into or otherwise violates the system integrity of remote machines, with malicious intent. • Crackers can • gain unauthorized access • destroy vital data • deny legitimate users service • Crackers can easily be identified because their actions are malicious. DCFM

  9. What Crackers Do ? • Rarely write their own programs. • They beg, borrow, or steal tools from others and use these tools not to improve Internet security, but to subvert it. • A true cracker creates nothing and destroys much. • A cracker’s chief pleasure comes from disrupting or otherwise adversely effecting the computer services of others. DCFM

  10. Different types of Malware Malware is a general name for all programs that are harmful : • Viruses • Trojan • Worms and all other similar programs. DCFM

  11. Worms A worm is a program that actively transmits itself over a network to infect other computers. It too may carry a payload. A worm spreads itself automatically. It is a self-replicating computer program, which uses a computer network to send copies of itself to other computers on the network. DCFM

  12. Worms cont… It may do so without any user intervention. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, whereas viruses almost always corrupt or modify files on a targeted computer. DCFM

  13. Trojan horses A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system. DCFM

  14. Computer Viruses • The best-known types of malware, viruses and worms. • The person might have a computer virus infection when the computer start acting differently. • When viruses activate they do very different things.Might show abnormal text, format hard disk or do changes to files. • For instance getting slow or • when they turn on the computer it says that all the data are erased or something else abnormal has happened. DCFM

  15. How Viruses Activate • Main mission of viruses is to spread out and then get active. • Then it hack into user account and sent data to its owner or slow that machine. • Viruses can not do any harm to hardware but they can do harm to programs and for example to BIOS so that computer does not start after that. DCFM

  16. Symptoms of Virus Attack • Computer runs slower then usual • Computer no longer boots up • Screen sometimes flicker • PC speaker beeps periodically • System crashes for no reason • Files/directories sometimes disappear • Denial of Service (DoS) DCFM

  17. What are the signs of Viruses • A computer virus can cause unusual screen displays, or messages - but most don't do that.  • A virus may slow the operation of a computer - but many times that doesn't happen.  DCFM

  18. An Example Of Error Message Due To Virus DCFM

  19. Categories of Viruses • There are three major types of viruses ; • Program Viruses • Boot Sector Viruses • Macro Viruses DCFM

  20. Boot Sector Viruses • A boot sector virus infects the boot sector and related areas on a hard or other storage disks. • Once the hard disk of a machine has been contaminated, the virus will be activated every time the machine is powered on. • The virus subsequently infects any disk that is inserted into the machine. DCFM

  21. Program Viruses • A Program virus contaminates files that contain computer code, specially “.exe” and “.com” files. • Whenever the user starts an application that runs the infected file, the virus is unleashed. • Program virus can spread through any medium that is used to transport software, including floppy disks, CD ROMs, pen drives, e mail attachments and network downloads. • About 85% of the more than 10,000 known viruses are program files. DCFM

  22. How to protect from Viruses The best way to protect your computer is to use updated anti-virus program. Antivirus “Examining (scanning) files to look for known viruses matching definitions in a virus dictionary” DCFM

  23. Antiviral programs • Microsoft Security Essentials • Avast Free Antivirus • AVG Free Antivirus • Avira AntiVir Personal • Panda Cloud Antivirus • Comodo Firewall + Antivirus • ClamWin Free Antivirus • Free eScan Antivirus Toolkit Utility • Kaspersky Antivirus • Data Fellows F-Plot • Mcafee Antivirus • Symantec Norton Antivirus • Bit Defender 2010 • Quick Heal Antivirus • ESaSS ThunderBYTE DCFM

  24. General Security Tips on Viruses • Apply user-level security on file sharing when needed. • Don't open email attachments from unknown senders. • Use Rich Text Format files instead of Word Documents. • Updated anti-virus program • Set the BIOS boot sequence • Write protection DCFM

  25. Basic input/output system (BIOS), The primary function of the BIOS is to load and start an operating system. When the PC starts up, the first job for the BIOS is to initialize and identify system devices such as the video display card, keyboard and mouse, hard disk, CD/DVD drive and other hardware. The BIOS then locates software held on a peripheral device (designated as a 'boot device'), such as a hard disk or a CD, and loads and executes that software, giving it control of the PC.[2] This process is known as booting, or booting up, which is short for bootstrapping. DCFM

  26. http://www.authorstream.com/Presentation/kanchanmbm-389694-presentation-www-internet-education-ppt-powerpoint/http://www.authorstream.com/Presentation/kanchanmbm-389694-presentation-www-internet-education-ppt-powerpoint/ DCFM

  27. WWW http://www.authorstream.com/Presentation/ahmedshah007-541068-computer-viruses-and-antiviruses/ DCFM

More Related