1 / 13

Unit 18

Unit 18. Data Security 1. Computing Crimes. Spreading viruses : Distributing programs that can reproduce themselves and are written with the purpose of causing damage or causing a computer to behave in an unusual way. Hacking :Gaining unauthorized access to a network system

meli
Download Presentation

Unit 18

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Unit 18 Data Security 1

  2. Computing Crimes • Spreading viruses : Distributing programs that can reproduce themselves and are written with the purpose of causing damage or causing a computer to behave in an unusual way. • Hacking :Gaining unauthorized access to a network system • Salami shaving : Manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts an accumulated elsewhere. The victims are often unaware of the crime because the amount taken from any individual is so small.

  3. Computing Crimes Cont. • Denial of service attack :Swamping a server with large numbers of requests • Trojan horse : A technique that involves adding concealed instructions to a computer program so that it will still work but will also perform prohibited duties. In other words, it appears to do something useful but actually does something descriptive in the background. • Trapdoors :A technique that involves leaving within a completed program , an illicit program that allows unauthorized an unknown –entry. • Mail bombing : Inundating an email address with thousands of message , slowing or even crashing the server.

  4. Computing Crimes cont. • Software privacy: Unauthorized copying of a program for sale or distributing to other users. • Piggybacking : Using another person's identification code or using that person's files before he or she has logged off ( disconnected from a network account) • Phishing :Tricking a user into revealing confidential information such as an access code or a credit card number. • Defecting : Changing the information shown on another person's website. • Hijacking :Redirecting anyone trying to visit a certain site elsewhere.

  5. A Computer Virus • A Computer Virus :is a program that can be reproduce itself and is written with the purpose of causing damage or causing a computer to behave in an unusual way. • How does it work? It infects other programs i.e. it attacks itself to other programs, known as host programs, and therefore reproduces itself. It operates by replacing the first instruction in the host program with a JUMP command . This command that changes the normal instruction sequence in a program causing the virus instructions to be executed ( process by process) before the host program instructions.

  6. A Computer Virus • When it attacks to operating system programs to integrated itself with the operating system ( the set of programs that control the basic functions of a computer and provide communication between the applications programs and the hardware), it is said to have patched the operating system. • Type of programs that viruses attach to : • COM Files ( command files ) • EXE Files ( executable files )

  7. How does the virus work? • A virus loaded into memory ( copied from the storage media into memory). • When a program it has attached itself to is run or executed ( process by process ). • It then becomes memory resident i.e. it stays in the memory until the computer is switched off. • When the virus is triggered by a predetermined event , it operates the payload ( the part of the virus that causes the damage.

  8. The Parts of the virus. • A misdirection routine that enables it to hide itself. • A reproduction routine that allows it to copy itself to other programs. • A trigger that causes the payload o be activated at a particular time or when a particular event takes place. • A payload that may be a fairly harmless joke or may be very destructive. • Note : a Program that has a payload but does not have a reproduction routine is know as a Trojan.

  9. Virus Types • Logic bombs that destroy data when triggered. • Boot sectors viruses : that store themselves in the boot sector of a disk ( the part of a disk containing the programs used to start up a computer). • File Viruses : that attach themselves to COM files. • Macro viruses : that are small macro programs that attach themselves to word processor files and use the macro programming facilities provided in some word processor programs

  10. Text Book • Exercises

  11. Language work: Cause and Effect (1) • What is the relationship between these actions? • A date or event occurs. • The trigger routine runs. • The payload routine activates. • The hard disk is wiped. These events form part of a cause and effect chain. The links between each event in a number of ways. • Using cause +to V or make +V 1- a date or event occurs which causes the trigger routine to run . 2- a date or event occurs which makes the trigger routine run.

  12. Language work: Cause and Effect (1) • Putting the events in sequence and using a causative verbs : 1- The trigger routine runs ,which activates the payload routine. • Putting the events in sequence and using a causative verbs: 1- when The trigger routine runs , the payload routine activates.

  13. Answers:Key(6) page 126-127 • when a dismissed employee’s name is deleted from the company’s payroll, a logic bomb is activated which causes the payroll records to be destroyed. • When a certain date occurs, a trigger routine is activated which makes keys beep when pressed and corrupts floppies. • When the operator starts up the computer for the one hundred and twenty-ninth time , a trigger routine is activated which causes the screen to display, ‘Bloody ! June 4,1989’. • When the infected program is run , the boot sector is corrupted which causes the disk content to be overwritten and data to be lost. • When a particular date occurs , the payload is triggered which makes characters on a text mode screen slide down to the bottom. • When an infected document is opened in the wordprocessor , the virus macro is executed which attached the virus code to the default template. When the users saves another document, the virus code attaches to the saved document. When the saved document is opened in the wordprocessor , the virus destroys data , displays a message or plays music.

More Related