Introduction To Information and Communication Technology Lecture 5
Introduction To Information and Communication Technology Lecture 5
Computer Sabotage
Computer sabotage: Acts of malicious destruction to a computer or computer resource
Botnet: A group of bots (computers controlled by a criminal) that are controlled by one
individual
Malware: Any type of malicious software
1. Written to perform destructive acts (damaging programs, deleting files, erasing drives, etc.)
2. Writing malware is considered unethical, distributing is illegal
3. Can infect mobile phones and mobile devices (some preinstalled on mobile devices)
Purpose of Computer Sabotage
Data or program alteration
Students changing grades etc.
Web site alteration
Web sites defaced to make political statements
Hacking into and changing social networking account contents (Facebook pages, Twitter
tweets, etc.)
Computer virus: A software program installed without the user’s knowledge and designed to
alter the way a computer operates or to cause harm to the computer system
First computer virus: The Brain Boot Sector Virus
Computer worm: Malicious program designed to spread rapidly by sending copies of itself to
other computers
Dangerous computer worms: Mydoom, iloveyou, wannacry
Trojan horse: is a type of malicious software that looks legitimate but can take control of your
computer. Usually appear to be a game or other program. Cannot replicate themselves; must be
downloaded and installed.
Ransomware Attack: Ransomware is a form of malware designed to encrypt files on a device,
rendering any files and the systems that rely on them unusable. Malicious actors then demand
ransom in exchange for decryption. Famous ransomware attacks: locky, wannacry, bad rabbit
Spoofing
Spoofing is the act of disguising a communication from an unknown source as being
from a known, trusted source.
Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a
computer spoofing an IP address
Man in the middle attack
Type of eavesdropping attack, where attackers interrupt an existing conversation or data
transfer. After inserting themselves in the "middle" of the transfer, the attackers pretend to be
both legitimate participants. This enables an attacker to intercept information and data from
either party while also sending malicious links or other information to both legitimate
participants in a way that might not be detected until it is too late.
Denial of service (DoS) attack: Act of sabotage that attempts to flood a network server or Web
server with so much activity that it is unable to function. Distributed DoS attack: Uses multiple
computers.
Phishing: Use of spoofed e-mail messages to gain credit card numbers and other personal data
Typically contains a link to a spoofed Web site
After victim clicks a link in the message and supplies sensitive data, that data is sent to
the thief. E-mails and Web sites often look legitimate
Spear phishing: A personalized phishing scheme targeted to specific individuals often include
personalized information to seem more legitimate, may impersonate someone in your
organization, such as from human resources or the IT dept.