COMPUTER AND INTERNET CRIME
What is crime?

It’s an illegal offence done
by a person that that breaks laws or made illicit acts. When associated by
computer still implies the same definition though the misdeed was done through
or with the help of a computer.
As such our teacher presented
us a table indicating the increasing of IT security Incidents reported since
year 1997 up to 2006.
IT Security
Incidents become major concerns because of this, safeguarding important and
confidential data is advice in order to prevent malicious acts and thefts or
disruption for IT related cases are growing around the world.
Why Computer Incidents Are So Prevalent
It’s because of the
complexity of technology, sometimes the reason is the sharing of ID’s and
passwords between employees and also increased reliance on commercial software
with known vulnerabilities. Exploit for example that takes advantage on
the systems weakness, but there are Patch and Zero-Day Attack that can ‘fix’
such problems.
Types of Exploits
·
Types of attacks
o
Virus
o
Worm
o
Trojan horse
o
Distributed
denial of service
o
Rootkit
o
Spam
o
Phishing
(spear-phishing, smishing, and vishing)
VIRUS

It is according to our teacher a ‘part’ of a programming
code that cause sudden and unwanted event. It conceals itself as something else
and often attached to files.
In addition there are called MACRO viruses that use
application language such as VBScript to infect documents and templates by replicating
it.
WORMS
”a worm is a self-replicating virus that does not alter files but resides
in active memory and duplicates itself. Worms use parts of an operating system
that are automatic and usually invisible to the user. It is common for worms to
be noticed only when their uncontrolled replication consumes system resources,
slowing or halting other tasks.”- http://searchsecurity.techtarget.com/definition/worm
These harmful programs can
spread itself without human involvement. Once it’s inside your computer it
immediately start attacking by losing your data and programs, and slows down
computer operation
Trojan Horses
“A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they
can be just as destructive. One of the most insidious types of Trojan horse is
a program that claims to rid your computer of viruses but instead introduces
viruses onto your computer.
The term comes from the a Greek story of the Trojan War, in which the
Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a
peace offering. But after the Trojans drag the horse inside their city walls,
Greek soldiers sneak out of the horse's hollow belly and open the city gates,
allowing their compatriots to pour in and capture Troy.”- http://www.webopedia.com/TERM/T/Trojan_horse.html
They are delivered by email attachments,
downloaded from web site or contracted via a removable media device. Two types:
Logics bombs and Time bombs.
Distributed Denial-of-Service
(DDoS) Attacks
”a denial-of-service
(DoS) or distributed denial-of-service (DDoS) attack is
an attempt to make a machine or network resource unavailable to its intended users. Although the means to
carry out, motives for, and targets of a DoS attack may vary, it generally
consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. As clarification,
DDoS (Distributed Denial of Service) attacks are sent by two or more persons,
or bots. DoS (Denial of Service) attacks are sent by one person or system.”
- http://en.wikipedia.org/wiki/Denial-of-service_attack
This happens when a malicious hacker takes over a
computer and use it to flood irrelevant data on the target site with use of
internet and the process on which this attack could be prevented from happening
it through; Filtering.
Rootkits
“A rootkit is a type of
malicious software that is activated each time your system boots up. Rootkits are difficult to detect because they are
activated before your system's Operating
System has completely booted up. A
rootkit often allows the installation of hidden files, processes, hidden user
accounts, and more in the systems OS. Rootkits are able to intercept data from
terminals,network connections,
and the keyboard.” - http://www.webopedia.com/TERM/R/rootkit.html
It is a set of programs that enables its user to gain
administrator-level access to a computer without the end user’s consent or
knowledge
Spam
“ spamming is the use of electronic messaging systems to send
unsolicited bulk messages (spam), especially advertising, indiscriminately. While
the most widely recognized form of spam is e-mail
spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, social spam, television advertising and file sharing spam”- http://en.wikipedia.org/wiki/Spam_(electronic)
This is rampantly shown on email accounts that abuses email
systems to send unsolicited email to large numbers of people.
Phishing

Such
as Incidents involving getting passwords on ATM machines using a device.
Types Of Perpetrators Includes:
·
Hackers
·
BLACK HAT HACKER (Cracker)
-Clearly of criminal activity
·
Industrial Spies
-use illegal means of getting classified information for trade
secret.
=types : Competitive
intelligence and Industrial espionage
·
Cybercriminals
-main goal is to steal
·
Hacktivists and Cyberterrorists
-Hacktivism, hacking for a specific goal
- Cyberterrorists, cause
harm than gather data.
Avoiding such case, there should be measures:
1.
Implementing
Trustworthy Computing
-having security of ay system and network to avoid being attacked.
2.
Risk assessment
-to help identify security related risks
3.
Establishing
a Security Policy
–to establish policy in the organization.
–includes additional security for the receiving and trading of
information
4.
Educating
Employees, Contractors, and Part-Time Workers
–training, for them to know the limitations and regulation in terms
of guarding their passwords and etc.,
5.
Prevention
–having layered security, installing good anti-virus and corporate firewall
6.
Detection
–this helps catch intruders in the act.
7.
Response
8.
–to develop
well advance of any incidents
Computer Forensics

Although
it is most often associated with the investigation of a wide variety of computer
crime, computer forensics may also be used in civil proceedings. The
discipline involves similar techniques and principles to data recovery,
but with additional guidelines and practices designed to create a legal audit
trail.
Evidence
from computer forensics investigations is usually subjected to the same
guidelines and practices of other digital evidence. It has been used in a
number of high-profile cases and is becoming widely accepted as reliable within
U.S. and European court systems.
-http://en.wikipedia.org/wiki/Computer_forensics