Professional Documents
Culture Documents
DEFINITION
CLASSIFICATION
DETECTION
PREVENTION
Outline
Thefirst recorded cyber crime took place in the
year 1820!
Theloom allowed the repetition of a series of
steps in the weaving of special fabrics.
Thisresulted in a fear amongst employees that
their traditional employment was being
threatened.
They committed acts of sabotage to discourage
further use of the new technology.
HISTORY
Internet
has offered us a much more convenient
way to share information across time and place.
Introduction
1.Computer as Target
2.Computer as an instrumentality
CLASSIFICATION OF CYBERCRIME
Physical damage
Computer as an instrumentality.
With the advent of computer the criminal
have started using the technology as an
aid for its perpetuation.
Means of coordinating .
Computer as Incidental
Copyright violation
◦ Sharing of copyright material – Torrents
Software piracy
◦ Selling material protected by copyrights
Component theft
Online gambling:
Email bombing
Salami attacks
Email spoofing
Cyber Defamation
Cyber stalking
Hacking
Logic bombs
Trojan attacks
Web jacking
Phishing
Zip Bombing
Email Bombing
Denial of Service - works by flooding the access
routers with bogus traffic.
Difficult
to block because it uses multiple,
changing, source IP addresses.
Denial of Service
Changing of data before or during entry into the
computer system
Prevention:
◦ Regular Audits
◦ Supervising employees
Data Diddling
A series of minor attacks that together results in a larger
attack
Prevention:
◦ Find indications of an attack
◦ Random audits
◦ Don't ignore what appear to be errors in computer-based financial
systems.
Salami Attack
The sender address and other parts of the e-mail
header are altered .
Prevention
Antivirus
Use cryptographic signatures
E-mail Spoofing
Is a piece of code intentionally inserted
into a software system
Prevention:
◦ Monitoring system
◦ Application logs are the keys to identifying
unwarranted activity
Logic Bomb
Unauthorizedremote computer break-ins via a
communication networks such as the Internet
Categories of hackers
◦ White hat or Ethical Hacker
◦ Grey hat
◦ Blue hat
◦ Black hat
◦ Elite
◦ Script kiddie
H4CK1NG
It is not possible to eliminate cyber crime from the cyber space.
Invest in Anti-virus, Firewall, and SPAM blocking software for your home PC.
Passwords
◦ Change passwords on a regular basis
◦ Use complex passwords