Viruses Articles Article 1 - Computer virus hits second energy firm Article 2 - Online bank robbers face.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
What is identity theft, and how can you protect yourself from it?
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Security for Internet Every Day Use Standard Security Practices and New Threats.
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
Trojan Horse Program Presented by : Lori Agrawal.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Cyber X-Force-SMS alert system for threats.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
1 Hackers 101 Julie Keil JoAna Swan John Adamo John Ponessa Arturo Jose` Ortiz.
Internet Fraud By: Noelle Woodman.
L o g o Types of Computer Crime Zhuravlev Alexander 326 MSLU.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Issues Raised by ICT.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Social impacts of the use of it By: Mohamed Abdalla.
MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Viruses.
Scams & Schemes Common Sense Media.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
Identity theft is one of the main problems in cyberspace increasing each year by 500%. Identity theft is when another public citizen/citizens take your.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Jamie Lyle (Cpsc 620) December 6, Overview  Logic Bombs  The story of Roger Duronio and UBS PaineWebber  Defenses against logic bombs.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
By: Atheer, Kristelle and jia. Computer worms are malicious software applications designed to spread via computer networks. Computer worms are one form.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
“2 million Facebook, Gmail and Twitter passwords stolen in massive hack”
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
COMPUTER VIRUSES By James Robins. THE IMPACT OF VIRUSES By James 2.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
ISYM 540 Current Topics in Information System Management
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Presentation transcript:

Viruses Articles Article 1 - Computer virus hits second energy firm Article 2 - Online bank robbers face jail time for e-crimes Article 3 - Hacker jailed for selling access to hijacked PCs for-selling-access-to-hijacked-pcs.html for-selling-access-to-hijacked-pcs.html

Article 1 - Computer virus hits second energy firm Computer systems at energy firm RasGas have been taken offline by a computer virus only days after a similar attack on oil giant Aramco. The attacks come as security experts warn of efforts by malicious hackers to target the oil and energy industry. The attack forced the Qatar-based RasGas firm to shut down its website and systems. RasGas, one of the world's largest producers of liquid petroleum gas, said production was not hit by the attack. The company said it spotted the "unknown virus" earlier this week and took desktop computers, and web servers offline as it cleaned up. The report comes only days after Saudi Arabia's Aramco revealed it had completed a clean-up operation after a virus knocked out 30,000 of its computers. The cyber- assault on Aramco also only hit desktop computers rather than operational plant and machinery. Both attacks come in the wake of alerts issued by security firms about a virus called "Shamoon" or "Disstrack" that specifically targets companies in the oil and energy sectors. Unlike many other contemporary viruses Shamoon/Disstrack does not attempt to steal data but instead tries to delete it irrecoverably. The virus spreads around internal computer networks by exploiting shared hard drives.

Article 2 - Online bank robbers face jail time for e-crimes Two men who used computer viruses to steal cash from online bank accounts have been jailed. Pavel Cyganok was jailed for five years and Ilja Zakrevski for four years for masterminding the hi-tech crimes. A third man, Aldis Krummins, was jailed for two years for helping launder some of the cash stolen by the pair. UK police were tipped off about the criminals by Estonian police who suspected Zakrevski was using viruses to target Britons. Cyganok and Zakrevski used the SpyEye trojan to steal login details for online bank accounts. Stolen data was uploaded to servers to which the pair had access. The Metropolitan Police's Central E-Crime Unit (PCEU) said it had seized one of the servers that was based in the UK, which revealed about 1,000 machines had been infected by SpyEye. The seizure led the PCEU to other machines through which the two men were identified. Cyganok was still logged on to one of the control servers when his home was raided and he was arrested. Zakrevski was arrested in Denmark for a different crime, but because British police had issued a European arrest warrant for him he was extradited to the UK in July The PCEU said the pair had used stolen money and credit cards to finance the "large scale" purchase of luxury goods, which they had then re-sold on auction sites. About £100,000 of the money stolen was laundered through online accounts to which the criminals had access.

Article 3 - US jails hacker who sold access to hijacked PCs A US hacker has been sentenced to 30 months in prison for cyber crimes. Joshua Schichtel of Phoenix, Arizona, was found guilty of renting out access to 72,000 PCs he had breached using computer viruses, BBC News reports. Schichtel used botnets, a network of compromised computers used to send out junk mail messages, to gain control of the PCs, and his clients used the machines to distribute their own malicious files. After completing his sentence, the offender will be subject to a three-year supervised release programme, during which his computer and internet access will be restricted. Schichtel was sentenced under the US Computer Fraud and Abuse Act, after admitting to one count of selling access to 72,000 machines that formed part of his botnet. He was previously accused of carrying out botnet attacks on numerous websites, along with four other men, but the case was dropped when the US authorities failed to file an indictment within a court-set deadline.