Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
PHISHING By, Himanshu Mishra Parrag Mehta. OUTLINE What is Phishing ? Phishing Techniques Message Delivery Effects of Phishing Anti-Phishing Techniques.
Internet Phishing Not the kind of Fishing you are used to.
3.04 Malicious Software Can Travel and Spread Unit 3 Internet Basics.
Computer Viruses.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses & Destructive Programs
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Unit 2 - Hardware Computer Security.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Types of Electronic Infection
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
How Phishing Works Prof. Vipul Chudasama.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Computer crimes.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Technical Implementation: Security Risks
An Introduction to Phishing and Viruses
Learn how to protect yourself against common attacks
CYBER SECURITY...
IT Security  .
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Spear Phishing Awareness
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang

Viruses Small amount of code that spreads from one computer to another Usually transmitted through attachments Execute as part of another program or attached to a document Spreads and infects other programs and documents

Viruses The Melissa virus of 1999 sent out attachments to 50 people in the address book, and it spread so fast that Microsoft and other companies had to shut down their service The ILOVEYOU virus in 2000 took a similar approach, and sent out attachments to all contacts of infected users

Trojans Don’t self-replicate or spread to other computers Called Trojans because they are disguised as legitimate software Once a trojan horse is opened, the hacker can remotely access the computer – Keyloggers – corrupt files – steal data, etc

Worms Have the ability to copy themselves to other computers over a network that they are on Do not have to be attached to a file or program The worm called “storm” appeared in 2007 and has infected at least 5 million computers, adding them to a ‘botnet’ which runs software in the background over a peer to peer network

Phising

What is phising? Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public.

How does phising work? Phishing is typically carried out by e- mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

Phising methods Filter evasion – Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing s. Website forgery – An attacker can use flaws in a trusted website's own scripts against the victim. Phone phishing – Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number was dialed, prompts told users to enter their account numbers and PIN.

Damage caused by phising Denial of access to Financial loss United States businesses lose an estimated 2 billion dollars per year as their clients become victims.

Why you should watch out Social networking sites are now a prime target of phishing, since the personal details in such sites can be used in identity theft Experiments show a success rate of over 70% for phishing attacks on social networks. Attacker can use the victim's sensitive information for fraudulent purposes or spamming.

Malicious Attacks: Hackers By: Angela Wang

What is a Hacker Cracker? "A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular."

More on Hackers A hacker is a person who breaks into computers, usually by gaining administrative controls. Not to be confused with the cyber-criminal hackers known as “crackers”.

History Before the internet, there were multiple independent and parallel networks only partially aware of each other’s existence. They created an ideal information sharing as a practical strategy among the community Software sharing emphasizing the right to “fork”

History cont’ The earliest networks were found at academic settings such as college campuses including Carnegie Mellon. When the Internet began they evolved into a hacker community with the rise of the free software movement Much of the hacker community system originated at MIT and at the Homebrew Computer Club.

What usually happens. Hacker scans the Internet for available “ports” (openings in computer that allows data to pass through a network) on the Internet. Hacker finds an unprotected port and inserts a TROJAN HORSE virus!! Trojan Horse Virus rides along attaching itself to a standard program. Unsuspecting person activates program and the virus transmits all access and control to the hacker.

To Avoid…being hacked Don’t give out passwords or usernames even to administrators. Change your password every once in a while. Should obtain a "firewall". A firewall, when combined with a good anti-virus program, helps stop unauthorized access on your computer, prevents virus infection, and "cloaks" your data ports against a hacker scanning for openings.

Example of recent Hackers Google vs. China Six students from a prestigious Jiatong Chinese University hacked into Internet Explorer 6 Although it is denied they are working for the government, there are still strong evidence for their involvement.

Works Cited Marshall, Marshall. "HowStuffWorks "How Computer Viruses Work"" HowStuffWorks - Learn How Everything Works! Web. 14 Jan “Trojan horse (computing).” “Wikipedia.”