Sie sind auf Seite 1von 29

Computer and Internet Crime

Click to edit Master subtitle style

Page 1

Types of Attacks

Viruses Worms Trojan Horse Denial-of-Service (DoS) Attacks Perpetrators

Page 2

VIRUS

Page 3

A virus is a piece of programming code that causes some unexpected and usually undesirable event

Page 4

F i l e i n f e c t o r s

Virus Types

Page 5

File infectors

Page 6

- replicate by inserting themselves into executable files. Usually, the virus code is written at the beginning of a targeted file, so it is executed immediately, or appended to the end.
Page 7

Partition-sector infectors

Page 8

contaminate the partition record of a hard disk. The virus copies and stores the whole partition sector somewhere else on the hard disk.
-

Page 9

Boot-sector viruses

Page 10

infect both floppy diskettes and hard disks by changing or replacing the bootsector program with a copy of itself.
-

Page 11

Companion Virus

Page 12

searches for executable programs with the .exe or .bat extension and creates a copy of itself with the same name but a .com extension.
-

Page 13

Macro Viruses

Page 14

- infect an applications document files. The virus contains a set of application-specific macro commands that automatically execute in an unsolicited manner and then spread to the applications documents.
Page 15

Worms

Page 16

Worms are harmful programs that reside in the active memory of the computer and duplicate themselves. They can propagate without human intervention.

Page 17

Trojan Horse

Page 18

A Trojan horse is a program or routine concealed in software that appears to be harmless. They may contain or include a worm or virus as part of the package.

Page 19

Denial-of-Service (DoS) Attacks

Page 20

A denial-of-service attack is one which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
Page 21

Perpetrators

Page 22

Hackers and Crackers


-

Hackers test the limitations of systems out of intellectual curiosity to see whether they can gain access and how far they can go.

Page 23

- Crackers break into other peoples networks and systems, deface Web pages, crash computers, spread harmful programs, and write scripts and automated program that let other people do the same things.

Page 24

Malicious Insiders
Insiders are not necessarily employees; they can be consultants as well. Their risk tolerance ranges from low to high, depending on whether they are motivated by financial gain, revenge on their employers or publicity.
Page 25

Industrial Spies
Industrial spies use illegal means to obtain trade secrets from competitors of the firm. Competitive intelligence uses legal information gathering techniques to obtain

Page 26

Cybercriminals
They hack into corporate computers and steal money, often by transferring money from one account to another.Leaving a hopeless complicated trail for law enforcement officer to follow.
Page 27

Cyber terrorists
They intimidate or coerce a government or organization to advance his or her political or social objectives by launching computer based attack against computers, network, and the information stored on them.
Page 28

Page 29