Computer Defining denial of service, worm, virus and email hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Virus Code Actions Clara Pirie & Eilidh Currie. Viruses A virus is a computer program that can copy itself and infect a computer without the permission.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Security, Privacy, and Ethics Online Computer Crimes.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
1.1 System Performance Security Module 1 Version 5.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Viruses & Destructive Programs
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
 a crime committed on a computer network, esp. the Internet.
Study of Computer Virus Worms Sampath Yerramalla 04/17/02.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
CRIME - A crime is a wrongdoing classified by the state or Congress as a felony or misdemeanor. A crime is an offence against a public law. This word,
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Types of Electronic Infection
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Internet Safety Internet Safety LPM
Crime Slides by Rachel Wood-Ross CSCI 101 Thu 2pm Class.
CONTENTS What is Virus ? Types of computer viruses.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
Cyber Security By:Jerusa Miller July 7, What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
1 3 Computing System Fundamentals 3.7 Utility Software.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Network Protection Against: Worms, Viruses, and Root Kits Ryan Del Vecchio Cosc. 352 October 1, 2008.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Chapter 40 Internet Security.
SEMINAR ON PC SECURITY FROM VIRUSES
Answer the questions to reveal the blocks and guess the picture.
COMPUTER CRIME.
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Security.
Internet Safety and The Digital Divide
Technology Mrs. Huddleston
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price

Computer Crime Overview General Facts about Computer Crime Denial of Service Information relating to Worm and Virus Causes of Computer Crime What is an hoax? Questions/ Comments References

General Information What is computer crime? Any crime in which the computer is the primary factor Examples include : -Unauthorized Use-Forgery & Counterfeiting -Fraud & Larceny -Harassment or stalking in cyberspace -Stealing Information by obtaining the hard drive or laptop -Inappropriate use of Internet services

Denial of Service An Incident in which a user or organization is deprived of the services of a resource they would normally have and need Destroy programming & files in a system Does not usually result in theft information or security loss Usually intentional and malicious but can happen accidentally

DoS Examples Commonly, a DoS attack happens when more traffic is sent to a network address than the programmers planned (basically too much information for system to handle) Sending oversized ICMP packets SYN Attack, Teardrop Attack, Smurf Attack, Viruses

Computer Virus A program or code that is loaded onto your computer without your knowledge. Facts about Viruses: - all viruses are manmade and are spread by human action - simple viruses are dangerous because they use up memory and bring system to a halt - more complex viruses can transmit across networks and bypass security systems - commonly spread by sharing infecting files and sending viruses as attachments in

Virus vs. Worm Worm- subclass of a virus and similar by design Difference is its capability to travel within the computer without outside help of a person. Has the capability to replicate itself on the computer Example: worm replicates and send itself out to everyone in receiver's address book and continues in the same manner

Hoax Intentional messages warning about false viruses and suggestions to remove a file or send the false warning to those in your address book Warning signs against a hoax: Look for phrases like “forward this to everyone you know” and “this is not a hoax” Uppercase letters and exclamation points are warning signs Check references related to the information to verify it is factual and true Hoax is often in the form of a chain letter

Protection for Computers Viruses= Anti Virus Protection Anti virus software: program that searches hard drive and floppy disk for potential viruses. If a virus is present the software will clean and delete necessary files Worm =Firewall Firewall is often a program that will not allow any unauthorized computers to get acess to protected computers. Important to protect networks from Internet hackers.

References /computer-crime/intro.html 99/computer-crime/intro.html HPIC: , HPIC:en&defl=en&q=define: +hoax&sa=X&oi=glossary_definition&ct=title HPIC: , HPIC:en&defl=en&q=define: +hoax&sa=X&oi=glossary_definition&ct=title wt2/www/R_Matiachuk/glossary.htm