120 likes | 273 Views
Computer Crimes. Cyber Crimes. Today criminals are doing everything from stealing intellectual property and committing frauds to unleashing viruses and committing acts of cyber terrorism. Computer Crimes.
E N D
Cyber Crimes • Today criminals are doing everything from stealing intellectual property and committing frauds to unleashing viruses and committing acts of cyber terrorism.
Computer Crimes • Unauthorized use, access, modification, destruction of hardware, software, data or network resources. • Unauthorized release of information. • Unauthorized copying of software's.
Case Study • PayPal Inc (www.paypal.com) • John Kothanek, PayPal lead investigator discovered that 40 or more accounts were created by 10 names and they used to buy goods fromebay.com • He set a sniffer software to catch packet traffic at the mock site. • Using tolls TraceRoute and Sam Spade, PayPal found the fake PayPal server address in Russia.
Hacking • Unauthorized use of Computer or Network or Resources of IT.
Common Hacking Tactics • Denial of Service • Hammering too many requests… • Scans • Sniffer • Search individual packets of data as they pass through Internet, capturing passwords or entire contents. • Spoofing • Faking an email address or Web Page to trick users into passing along critical information's like passwords or credit card numbers.
Common Hacking Tactics • Trojan Horse • Back Doors • Few hidden ways to make reentry. • Malicious Applets • Misuses the computer resources, modify files, send fake emails, steal passwords. • War Dialing • Programs that automatically dial numbers. • Logic Bombs • Instruction in the computer program that triggers a malicious act
Common Hacking Tactics • Buffer Overflow • Sending to much data • Replicating the data • Password Crackers • Social Engineering • Tactic used to gain the Companies Information • Dumpster Diving • Company’s garbage to find the information
Internet abuses at workplace • General email abuses • Unauthorized usage and access • Plagiarism – copying logos, website, softwares • Newsgroup posting • Transmission of confidential data • Pornography • Hacking • Non work related download • Leisure use of Internet • Moonlighting
Top five Virus family • MyDoom • Netsky • SoBig • Klez • Sasser
Case Study – Etrade Financial Corp • Online Stock Broker • Has 3.5 million customers • More than 100000 trades per day • Trades are completed in a second, that spans multiple computers, routers, application not all controlled by Etrade. • $70 million exchanges takes place per day.