270 likes | 290 Views
Cyber Crimes & Computer Viruses. Borrowed by Tate. Computer Crimes ( Cyber Crimes). Cyber crime encompasses any criminal act dealing with computers and networks. Computer Crimes ( Cyber Crimes).
E N D
Cyber Crimes & Computer Viruses Borrowed by Tate
Computer Crimes ( Cyber Crimes) Cyber crime encompasses any criminal act dealing with computers and networks Borrowed by Tate
Computer Crimes ( Cyber Crimes) Cybercrime is a growing concern for both law enforcement officials and consumers as a result of the rapid expansion of the Internet into all forms of business and commerce. All aspects of the Internet are vulnerable to such activities, including the World Wide Web, e-mail, chat rooms, and newsgroups. DCFM
Types of Cyber Criminals • Unauthorized access by insiders. • System penetration by outsiders. • Theft of proprietary information. • Financial fraud using computers. • Sabotage of data or networks. • Disruption of network traffic (e.g., denial of service attacks) DCFM
Types of Cyber Criminals Cont... • Creation and distribution of computer viruses. • Software piracy. • Identity theft. • Hardware theft (e.g., laptop theft). • The most common types of cybercrime experienced by companies were virus infection, insider abuse of network resources, and unauthorized access by insiders. DCFM
Types of Cyber Crimes • Viruses • Worms • Trojans • Hoaxes • Mail bombs • Threats • Harassment • Stalking • Fraud • Theft • Forgery • Piracy • Break-ins • Terrorism DCFM
Hackers Hackers are programmers. They should have the knowledge of advanced technology of operating systems and programming languages, and they may know of holes within systems and the reasons for such holes. They constantly seek further knowledge, freely share what they have discovered, and never, ever intentionally damage data. DCFM
Crackers • A Crackeris a person who breaks into or otherwise violates the system integrity of remote machines, with malicious intent. • Crackers can • gain unauthorized access • destroy vital data • deny legitimate users service • Crackers can easily be identified because their actions are malicious. DCFM
What Crackers Do ? • Rarely write their own programs. • They beg, borrow, or steal tools from others and use these tools not to improve Internet security, but to subvert it. • A true cracker creates nothing and destroys much. • A cracker’s chief pleasure comes from disrupting or otherwise adversely effecting the computer services of others. DCFM
Different types of Malware Malware is a general name for all programs that are harmful : • Viruses • Trojan • Worms and all other similar programs. DCFM
Worms A worm is a program that actively transmits itself over a network to infect other computers. It too may carry a payload. A worm spreads itself automatically. It is a self-replicating computer program, which uses a computer network to send copies of itself to other computers on the network. DCFM
Worms cont… It may do so without any user intervention. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, whereas viruses almost always corrupt or modify files on a targeted computer. DCFM
Trojan horses A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system. DCFM
Computer Viruses • The best-known types of malware, viruses and worms. • The person might have a computer virus infection when the computer start acting differently. • When viruses activate they do very different things.Might show abnormal text, format hard disk or do changes to files. • For instance getting slow or • when they turn on the computer it says that all the data are erased or something else abnormal has happened. DCFM
How Viruses Activate • Main mission of viruses is to spread out and then get active. • Then it hack into user account and sent data to its owner or slow that machine. • Viruses can not do any harm to hardware but they can do harm to programs and for example to BIOS so that computer does not start after that. DCFM
Symptoms of Virus Attack • Computer runs slower then usual • Computer no longer boots up • Screen sometimes flicker • PC speaker beeps periodically • System crashes for no reason • Files/directories sometimes disappear • Denial of Service (DoS) DCFM
What are the signs of Viruses • A computer virus can cause unusual screen displays, or messages - but most don't do that. • A virus may slow the operation of a computer - but many times that doesn't happen. DCFM
Categories of Viruses • There are three major types of viruses ; • Program Viruses • Boot Sector Viruses • Macro Viruses DCFM
Boot Sector Viruses • A boot sector virus infects the boot sector and related areas on a hard or other storage disks. • Once the hard disk of a machine has been contaminated, the virus will be activated every time the machine is powered on. • The virus subsequently infects any disk that is inserted into the machine. DCFM
Program Viruses • A Program virus contaminates files that contain computer code, specially “.exe” and “.com” files. • Whenever the user starts an application that runs the infected file, the virus is unleashed. • Program virus can spread through any medium that is used to transport software, including floppy disks, CD ROMs, pen drives, e mail attachments and network downloads. • About 85% of the more than 10,000 known viruses are program files. DCFM
How to protect from Viruses The best way to protect your computer is to use updated anti-virus program. Antivirus “Examining (scanning) files to look for known viruses matching definitions in a virus dictionary” DCFM
Antiviral programs • Microsoft Security Essentials • Avast Free Antivirus • AVG Free Antivirus • Avira AntiVir Personal • Panda Cloud Antivirus • Comodo Firewall + Antivirus • ClamWin Free Antivirus • Free eScan Antivirus Toolkit Utility • Kaspersky Antivirus • Data Fellows F-Plot • Mcafee Antivirus • Symantec Norton Antivirus • Bit Defender 2010 • Quick Heal Antivirus • ESaSS ThunderBYTE DCFM
General Security Tips on Viruses • Apply user-level security on file sharing when needed. • Don't open email attachments from unknown senders. • Use Rich Text Format files instead of Word Documents. • Updated anti-virus program • Set the BIOS boot sequence • Write protection DCFM
Basic input/output system (BIOS), The primary function of the BIOS is to load and start an operating system. When the PC starts up, the first job for the BIOS is to initialize and identify system devices such as the video display card, keyboard and mouse, hard disk, CD/DVD drive and other hardware. The BIOS then locates software held on a peripheral device (designated as a 'boot device'), such as a hard disk or a CD, and loads and executes that software, giving it control of the PC.[2] This process is known as booting, or booting up, which is short for bootstrapping. DCFM
http://www.authorstream.com/Presentation/kanchanmbm-389694-presentation-www-internet-education-ppt-powerpoint/http://www.authorstream.com/Presentation/kanchanmbm-389694-presentation-www-internet-education-ppt-powerpoint/ DCFM
WWW http://www.authorstream.com/Presentation/ahmedshah007-541068-computer-viruses-and-antiviruses/ DCFM