mod h-1 examples of computer crimes. mod h-2 stuxnet

17
Mod H-1 Examples of Computer Crimes

Upload: brook-king

Post on 18-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Mod H-1

Examples of Computer Crimes

Mod H-2

Stuxnet

Mod H-3

Other Types of Malware Spoofing Trojan Horse Keylogger (key trapper) software – a

program that, when installed on your computer, records every keystroke and mouse click

Misleading e-mail Denial-of-service attacks Rootkit Web defacing

Mod H-4

Stand-Alone Viruses

Spoofing – forging of return address on e-mail so that it appears to come from someone other than sender of record

Much spam is distributed this way

Mod H-5

Trojan Horse Viruses

Trojan horse virus – hides inside other software, usually an attachment or download

Objective is to cause damage to your system or commandeer computer resources

Often in free downloadable games

Mod H-6

Misleading E-mail: Virus Hoax

Virus hoax is an e-mail telling you of a non-existent virus Makes recipients believe that they

already have a virus and gives instructions on removal which actually delete a Windows file

Often purports to come from Microsoft –Microsoft always sends you to a Web site to find the solution to such a problem

Mod H-7

Distributed DoS

Distributed denial-of-service attack (DDoS) – attacks from multiple computers that flood a Web site with so many requests for service that it slows down or crashes.

Ping-of-Death - DoS attack designed to crash Web sites

Mod H-8

Distributed Denial-of-Service Attack

Mod H-9

Rootkits

Rootkit – software that gives the attacker administrator rights to a computer or network

Its purpose is to allow the attacker to conceal processes, files, or system data from the operating system.

Mod H-10

Cyber War

Cyber war – actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption

Maybe the next major attack on the U.S.

Some intrusions into critical systems have already taken place

Mod H-11

Players

Hackers – knowledgeable computer users who use their knowledge to invade other people’s computers

Thrill-seeker hackers – break into computer systems for entertainment

White-hat (ethical) hackers – computer security professionals who are hired by a company to uncover vulnerabilities in a network

Mod H-12

Players

Black hat hackers – cyber vandals. They’re the people who exploit or destroy information

Crackers – hackers for hire, the people who engage in electronic corporate espionage Social engineering – acquiring

information that you have no right to by means of deception

Mod H-13

DIGITAL FORENSICS

Digital forensics – the collection, authentication, preservation, and examination of electronic information for presentation in court

Two phases1. Collecting, authenticating, and

preserving electronic evidence2. Analyzing the findings

Mod H-14

MD5 and SHA-1 Hash Values

MD5 hash valueMD5 hash value

SHA-1 hash SHA-1 hash valuevalue

Mod H-15

Third Party Tools

Encryption – scrambles the contents of a file so that you can’t read it without the decryption key

Steganography – hiding information inside other information The watermark on dollar bills is an example

U3 Smart drive – stores and can launch and run software without going through the hard disk thus leaving no trace of itself

Mod H-16

Steganography

You can’t see You can’t see the parts of the parts of the picture the picture that were that were

changed to changed to encode the encode the

hidden hidden messagemessage

Mod H-17

WHO NEEDS DIGITAL FORENSICS

INVESTIGATORS? Digital forensics is used in

The military for national and international investigations

Law enforcement, to gather electronic evidence in criminal investigations

Corporations and not-for-profits for internal investigations

Consulting firms that special in forensics