We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAlyson O'Grady
Modified over 2 years ago
Chapter 6 Computer Fraud and Abuse Techniques Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 6-1
Learning Objectives Compare and contrast computer attack and abuse tactics. Explain how social engineering techniques are used to gain physical or logical access to computer resources. Describe the different types of malware used to harm computers. Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 6-2
Computer Attacks and Abuse Hacking Unauthorized access, modification, or use of a computer system or other electronic device Social Engineering Techniques, usually psychological tricks, to gain access to sensitive data or information Used to gain access to secure systems or locations Malware Any software which can be used to do harm Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 6-3
Types of Computer Attacks BotnetRobot Network Network of hijacked computers Hijacked computers carry out processes without users knowledge Zombiehijacked computer Denial-of-Service (DoS) Attack Constant stream of requests made to a Web-server (usually via a Botnet) that overwhelms and shuts down service Spoofing Making an electronic communication look as if it comes from a trusted official source to lure the recipient into providing information Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 6-4
Types of Spoofing sender appears as if it comes from a different source Caller-ID Incorrect number is displayed IP address Forged IP address to conceal identity of sender of data over the Internet or to impersonate another computer system Address Resolution Protocol (ARP) Allows a computer on a LAN to intercept traffic meant for any other computer on the LAN SMS Incorrect number or name appears, similar to caller-ID but for text messaging Web page Phishing (see below) DNS Intercepting a request for a Web service and sending the request to a false service Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 6-5
Hacking Attacks Cross-Site Scripting (XSS) Unwanted code is sent via dynamic Web pages disguised as user input. Buffer Overflow Data is sent that exceeds computer capacity causing program instructions to be lost and replaced with attacker instructions. SQL Injection (Insertion) Malicious code is inserted in the place of query to a database system. Man-in-the-Middle Hacker places themselves between client and host. Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 6-6
Additional Hacking Attacks Password Cracking Penetrating system security to steal passwords War Dialing Computer automatically dials phone numbers looking for modems. Phreaking Attacks on phone systems to obtain free phone service. Data Diddling Making changes to data before, during, or after it is entered into a system. Data Leakage Unauthorized copying of company data. Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 6-7
Hacking Embezzlement Schemes Salami Technique Taking small amounts from many different accounts. Economic Espionage Theft of information, trade secrets, and intellectual property. Cyber-Bullying Internet, cell phones, or other communication technologies to support deliberate, repeated, and hostile behavior that torments, threatens, harasses, humiliates, embarrasses, or otherwise harms another person. Internet Terrorism Act of disrupting electronic commerce and harming computers and communications. Internet Misinformation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 6-8
Hacking for Fraud Internet Misinformation Using the Internet to spread false or misleading information Internet Auction Using an Internet auction site to defraud another person Unfairly drive up bidding Seller delivers inferior merchandise or fails to deliver at all Buyer fails to make payment Internet Pump-and-Dump Using the Internet to pump up the price of a stock and then selling it Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 6-9
Social Engineering Techniques Identity Theft Assuming someone elses identity Pretexting Inventing a scenario that will lull someone into divulging sensitive information Posing Using a fake business to acquire sensitive information Phishing Posing as a legitimate company asking for verification type information: passwords, accounts, usernames Pharming Redirecting Web site traffic to a spoofed Web site. Typesquatting Typographical errors when entering a Web site name cause an invalid site to be accessed Tabnapping Changing an already open browser tab Scavenging Looking for sensitive information in items thrown away Shoulder Surfing Snooping over someones shoulder for sensitive information Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 6-10
More Social Engineering Lebanese Loping Capturing ATM pin and card numbers Skimming Double-swiping a credit card Chipping Planting a device to read credit card information in a credit card reader Eavesdropping Listening to private communications Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 6-11
Type of Malware Spyware Secretly monitors and collects personal information about users and sends it to someone else Adware Pops banner ads on a monitor, collects information about the users Web-surfing, and spending habits, and forward it to the adware creator Key logging Records computer activity, such as a users keystrokes, s sent and received, Web sites visited, and chat session participation Trojan Horse Malicious computer instructions in an authorized and otherwise properly functioning program Time bombs/logic bombs Idle until triggered by a specified date or time, by a change in the system, by a message sent to the system, or by an event that does not occur Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 6-12
More Malware Trap Door/Back Door A way into a system that bypasses normal authorization and authentication controls Packet Sniffers Capture data from information packets as they travel over networks Rootkit Used to hide the presence of trap doors, sniffers, and key loggers; conceal software that originates a denial-of-service or an spam attack; and access user names and log-in information Superzapping Unauthorized use of special system programs to bypass regular system controls and perform illegal acts, all without leaving an audit trail Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 6-13
Chapter 6 Computer Fraud and Abuse Techniques Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 6-1.
Copyright © 2015 Pearson Education, Inc. Computer Fraud and Abuse Techniques Chapter
Copyright © Pearson Education Limited Computer Fraud and Abuse Techniques Chapter
Issues for Computer Users, Electronic Devices, Computer and Safety.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Norton UniversityE-commerce in Action1 PART THREE E-commerce in Action.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Cyber Crimes. Introduction Definition Types Classification.
What is risk online operation: massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily. To unauthorized.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem Overall size of cybercrime unclear; amount of losses.
Principles of Information Security, 2nd Edition1 Threats and Attacks.
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click your.
PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI MIS Paying for Privacy Phishing that bites Pirates.
Computer Ethics Ms. Scales. Computer Ethics Ethics the right thing to do Acceptable Use Policy A set of rules and guidelines that are set up to regulate.
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Threats To A Computer Network. 11 Most Common Computer Security Threats (Virus) Threat #1: Virus A virus is a piece of software that can replicate itself.
Computer Crimes Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played.
1 Chapter 9 Information Systems Ethics, Computer Crime, and Security Information Systems Today Leonard Jessup and Joseph Valacich.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Software Security Testing Vinay Srinivasan cell:
Any criminal action perpetrated primarily through the use of a computer.
Chapter 9 Information Systems Ethics, Computer Crime, and Security Information Systems Today Leonard Jessup and Joseph Valacich.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Be Safe Online. Agree, Disagree, Maybe if… Worksheet Activity Discussion.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Information Systems Week 7 Securing Information Systems.
Computer Fraud Pertemuan XVI Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Topic 5: Basic Security. Topic Review... This topic will cover: - Understand the networking threats. :> Describe the risks of network intrusion. :> Sources.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Chapter 11 Security and Privacy: Computers and the Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Network and Internet Security and Privacy. Explain network and Internet security concerns Identify online threats.
© 2017 SlidePlayer.com Inc. All rights reserved.