Wednesday, January 29, 2014

Computer and Internet Crime

COMPUTER AND INTERNET CRIME





What is crime?



“A crime occurs when someone breaks the law by an overt act, omission or neglect that can result in punishment. A person who has violated a law, or has breached a rule, is said to have committed a criminal offense.” -crime.about.com
It’s an illegal offence done by a person that that breaks laws or made illicit acts. When associated by computer still implies the same definition though the misdeed was done through or with the help of a computer.
As such our teacher presented us a table indicating the increasing of IT security Incidents reported since year 1997 up to 2006.
IT Security Incidents become major concerns because of this, safeguarding important and confidential data is advice in order to prevent malicious acts and thefts or disruption for IT related cases are growing around the world.


Why Computer Incidents Are So Prevalent

It’s because of the complexity of technology, sometimes the reason is the sharing of ID’s and passwords between employees and also increased reliance on commercial software with known vulnerabilities. Exploit for example that takes advantage on the systems weakness, but there are Patch and Zero-Day Attack that can ‘fix’ such problems.



Types of Exploits


·         Types of attacks
o   Virus
o   Worm
o   Trojan horse
o   Distributed denial of service
o   Rootkit
o   Spam
o   Phishing (spear-phishing, smishing, and vishing)





VIRUS
“A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".  Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes. However, not all viruses carry a destructive payload or attempt to hide themselves—the defining characteristic of viruses is that they are self-replicating computer programs which install themselves without the user's consent.”

It is according to our teacher a ‘part’ of a programming code that cause sudden and unwanted event. It conceals itself as something else and often attached to files.
In addition there are called MACRO viruses that use application language such as VBScript to infect documents and templates by replicating it.


WORMS





”a worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks.”- http://searchsecurity.techtarget.com/definition/worm


These harmful programs can spread itself without human involvement. Once it’s inside your computer it immediately start attacking by losing your data and programs, and slows down computer operation


Trojan Horses

“A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
The term comes from the a Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.”- http://www.webopedia.com/TERM/T/Trojan_horse.html

They are delivered by email attachments, downloaded from web site or contracted via a removable media device. Two types: Logics bombs and Time bombs.


Distributed Denial-of-Service (DDoS) Attacks

”a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. As clarification, DDoS (Distributed Denial of Service) attacks are sent by two or more persons, or bots. DoS (Denial of Service) attacks are sent by one person or system.” - http://en.wikipedia.org/wiki/Denial-of-service_attack

This happens when a malicious hacker takes over a computer and use it to flood irrelevant data on the target site with use of internet and the process on which this attack could be prevented from happening it through; Filtering.


Rootkits
“A rootkit is a type of malicious software that is activated each time your system boots up. Rootkits are difficult to detect because they are activated before your system's Operating System has completely booted up. A rootkit often allows the installation of hidden files, processes, hidden user accounts, and more in the systems OS. Rootkits are able to intercept data from terminals,network connections, and the keyboard.” - http://www.webopedia.com/TERM/R/rootkit.html

It is a set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge


Spam
 spamming is the use of electronic messaging systems to send unsolicited bulk messages (spam), especially advertising, indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, social spam, television advertising and file sharing spam”- http://en.wikipedia.org/wiki/Spam_(electronic)
This is rampantly shown on email accounts that abuses email systems to send unsolicited email to large numbers of people.



Phishing
“Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.”- http://en.wikipedia.org/wiki/Phishing
Such as Incidents involving getting passwords on ATM machines using a device.












Types Of Perpetrators Includes:

·         Hackers
-white hat hackers are people who use hacking for good purpose.

·         BLACK HAT HACKER (Cracker)
-Clearly of criminal activity

·         Industrial Spies
-use illegal means of getting classified information for trade secret.
                =types : Competitive intelligence and Industrial espionage

·         Cybercriminals
-main goal is to steal

·         Hacktivists and Cyberterrorists
-Hacktivism, hacking for a specific goal
- Cyberterrorists,  cause harm than gather data.




Avoiding such case, there should be measures:

1.       Implementing Trustworthy Computing
-this delivers private and secure data.
-having security of ay system and network to avoid being attacked.
2.       Risk assessment
-to help identify security related risks
3.       Establishing a Security Policy
–to establish policy in the organization.
–includes additional security for the receiving and trading of information
4.       Educating Employees, Contractors, and Part-Time Workers
training, for them to know the limitations and regulation in terms of guarding their passwords and etc.,
5.       Prevention
–having layered security, installing good anti-virus  and corporate firewall
6.       Detection
–this helps catch intruders in the act.
7.       Response
8.       –to develop well advance of any incidents



Computer Forensics

Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information.
Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail.
Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence. It has been used in a number of high-profile cases and is becoming widely accepted as reliable within U.S. and European court systems.
-http://en.wikipedia.org/wiki/Computer_forensics




No comments:

Post a Comment