0% found this document useful (0 votes)
84 views8 pages

CYBER CRIME Topics

This document discusses various topics related to cybersecurity including cyber crimes, computer threats, reasons for prevalent computer incidents, classifications of computer criminals and hackers, and types of computer attacks. It describes how cyber crimes can take different forms like malware, hacking, data theft and scams. It also lists factors that increase computer vulnerabilities such as complexity, user expectations, technological changes, reliance on software with flaws, and delayed updates. Further, it classifies perpetrators of computer crimes as hackers, crackers, insiders, industrial spies, cyber criminals and cyberterrorists. It also categorizes hackers based on their motivations and intentions. Finally, it outlines various types of computer attacks including viruses, worms, Trojan horses and denial of service attacks

Uploaded by

Loy Guard
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views8 pages

CYBER CRIME Topics

This document discusses various topics related to cybersecurity including cyber crimes, computer threats, reasons for prevalent computer incidents, classifications of computer criminals and hackers, and types of computer attacks. It describes how cyber crimes can take different forms like malware, hacking, data theft and scams. It also lists factors that increase computer vulnerabilities such as complexity, user expectations, technological changes, reliance on software with flaws, and delayed updates. Further, it classifies perpetrators of computer crimes as hackers, crackers, insiders, industrial spies, cyber criminals and cyberterrorists. It also categorizes hackers based on their motivations and intentions. Finally, it outlines various types of computer attacks including viruses, worms, Trojan horses and denial of service attacks

Uploaded by

Loy Guard
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Elective 2- Cybersecurity and Bomb Awareness

Prepared By: Stranger (A.G.A)

CYBER CRIME
Cybercrime or computer crime is any Criminal offense that involves a computer and a network.
Cybercrimes can take various forms including the creation of malicious programs, denial of service attacks,
rouge wi-fi hotspot, data manipulation, Identity theft, internet scams, and Cyberbullying.
The bellow are some of the aspects that computer criminals can be dangerous:
a. Human threat
b. Organizational Threat
c. Group Threat
d. National Security Threat

WHY COMPUTER INCIDENTS ARE PREVALENT


Increasing Complexity Increases Vulnerability
Increasing the level of complexity vulnerability is heightened. As more devices are connected to a
network, the number of potential entry points grows, raising the risk of security breaches.

Higher Computer User Expectations


Money equals time. The most Involved active computer users can be, the sooner they can solve a
problem. As a result, tech service desk are under tremendous pressure to respond to customer inquiries as quick
as possible.
Technological Advancement Introduces New Risks
Today, knowledge is exchange on the networks with million of other machines due to increased market
demands, globalizations, distributed working, and recent technical breakthroughs.
Increasing Reliance on commercial software with known Vulnerabilities
Many companies are heavily reliant on proprietary software that has known Flaws. Some corporate IT
companies opt to use already developed applications “as is” rather than introduce security fixes that make the
software difficult to use or delete “nice-to-have” functionality recommended by existing or future buyers, which
help market the software.
Bringing Your Own Device (BYOD) policy
Employees access company data using personal devices such as cellphones, smartphones, and to stay
connected and available at all times, posing a security risk.
Delay in software updates
Most companies are unaware of the looming dangers and defer program upgrades for a variety of reasons,
including a lack of time, additional costs, or simple indifference, leaving the organization's computer vulnerable
to attack.
CLASSIFICATIONOFPERPETRATORSOFCOMPUTER CRIME
1.Hackers
They do it out of scientific curiosity and see how they can get access to information systems and how far they
can go. They have a limited knowledge of information systems and security features, and their motives are
largely guided by a willingness to learn more.
2.Crackers
They hack into other people's networks and systems to do things like deface Web sites, crash computers,
distribute malicious programs or hateful messages, and write scripts and automated programs that enable others
to do the same.
3. Malicious Insiders
Since they are often granted access to the networks they misuse, they are incredibly difficult to track or avoid.
They are familiar with specific programs, which also require protocols for obtaining login IDs and passwords.
4. Industrial Spies
They procure trade secrets from their sponsor's rivals by fraudulent means. Insiders, such as angry employers
and ex-employees, are the most common thieves of trade secrets. Competitive intelligence gathers material that
is publicly accessible through legitimate methods. Financial accounts, trade publications, corporate filings, and
printed interviews with company executives are used to compile and interpret information. Theft of innovative
product ideas, manufacturing records, marketing documents, or new tech source code are all examples of
industrial espionage.
5. Cyber Criminals
The opportunity for material gain motivates cybercriminals. They rob by breaking into company servers and
converting funds from one account to another, leaving a hopelessly confusing path for law enforcement to trace.
They stole and resold credit card numbers, personal names, and cellphone IDs, among other types of computer
fraud.
6. Cyberterrorists
In order to advance such political or social objectives, a cyberterrorist conducts a computer-based assault
against other computers or networks in an effort to intimidate or coerce a nation. Cyberterrorists employ tactics
to destroy or interrupt networks in order to inflict damage rather than gather information. They are extremely
risky, since they regard themselves as at war, have ahigh risk tolerance, and pursue full effects.
CLASSIFICATION OF HACKERS
Hackers are divided into groups based on their motivation for breaking into a structure. Both words are derived
from old spaghetti westerns in which the bad guy wears a black cowboy hat and the good guy wears a white
cowboy hat.
1. White Hat Hackers - They're often referred to as “ethical hackers.” As part of intrusion testing and risk
assessments, they never plan to damage advice; rather, they aim to discover vulnerabilities in a computer or
network system. Ethical hacking is not a crime, and it is one of the most difficult jobs in the IT industry. For
penetration testing and risk tests, often businesses employ ethical hackers.
2. Black Hat Hackers -These hackers, also known as “crackers,” attempt to obtain unauthorized access to a
device in order to disrupt its activities or steal classified information. Because of its bad intent, black hat
hacking is still illegal, like stealing corporate data, breaching privacy, causing server damage, blocking network
connectivity, and soon.
3. Gray Hat Hackers - These hackers are a mix of black and white. They behave without malice, just for the
sake of amusement, they exploit a security flaw in a computer device or network without the consent or
knowledge of the owner. They want to put the flaw to the notice of the owners in exchange for gratitude or a
small reward. Have note. Hackers, whether gray or grey, are the same
4. Miscellaneous Hackers - There are other types of hackers depending on what they hack and how they hack,
in addition to the well-known ones mentioned above. The following are some of them:
a. Red Hat Hacker - Is a combination of black and white hat hackers. They normally operate at the level of
hacking government departments, top-secret intelligence hubs, and everything else that pertains to classified
data.
b. Blue Hat Hacker - Is a person who work independently of computer security consultancy companies and is
responsible for bug-testing a device prior to its release. They search for flaws in the system that can be used and
work to plug them. The word “Blue Hat” is used by Microsoft to refer to a series of security briefings.
c. Elite Hacker - Is a hacker's social standing that is used to identify the most experienced hacker.
d.Script Kiddie - Is a non-expert who breaks into computer systems using pre-packaged programmed tools
written by others and no knowledge of the underlying definition, hence the name “kiddie.”
e.Green Hat Hacker (Neophyte, “nOOb,”“Newbie) - Is someone who is new to hacking or phreaking and has
little to no understanding about how computers and hacking work.
f. Hacktivist - Is a hacker who uses computers to spread a message that is psychological, ideological, moral, or
governmental. The majority of hacktivism entails defacing websites or launching denial-of-service attacks.

TYPES OF COMPUTER ATTACKS


1. Viruses-There are applications that travel through networks and operating systems, attaching themselves to a
variety of other programs and databases. These disruptive viruses can modify and/or erase files after they have
been enabled. It is a serious offense to intentionally create and distribute a virus. Unfortunately, new computer
viruses emerge on a regular basis. The best way to remain up to date is to subscribe to utilities that monitor
viruses on a regular basis.
2. Worms - There are programs that repeatedly reproduce themselves. The self-replicating activity clogs
computers and networks until it becomes involved in a network, slowing or stopping their operations. A new
worm spread around the globe in hours, shutting down tens of thousands of machines in the process. A worm,
unlike a virus, does not bind itself to a computer or alter or erase files. Worms, on the other hand, can bear a
virus. If a worm has dropped a virus into an unwitting operating device, the virus will either activate right away
or remain inactive until a later date.
Viruses and worms are usually spread through he-mail attachments and programs downloaded from the Internet.
Since viruses are so dangerous, computer users are cautioned to never open an e-mail attachment from an
unknown sender and to take extreme caution when installing new programs or data from any source.
Antivirus software warns users as viruses and worms infiltrate their operating system. Unfortunately, new
viruses emerge on a regular basis, and not all of them can be identified.
3. Trojan Horses - There are applications that tend to be harmless, but they actually contain malicious code.
Trojan horses aren't the same as viruses. They, like worms, can, however, carry viruses. Trojan horses are most
often seen in the form of free video games and screensaver applications that can be downloaded from the
Internet. When a user runs one of these applications, the Trojan horse often installs a virus on the operating
system without the user's knowledge. The virus then starts causing problems. One of the most dangerous Trojan
horse forms claims to provide free antivirus software. When a user downloads one of these applications, the
Trojan horse first install a virus that locates and disable all installed antivirus software before depositing viruses.
4. Denial of service
By overwhelming a computer system or network with requests for information and data, a denial of service
attack aims to delay or stop it. When a malicious hacker takes control of computers on the Internet, they spam a
target server with requests for data and other minor activities. It does not entail gaining access to the targeted
device. Instead, it leaves the target so busy responding to a torrent of automatic requests that legitimate users are
unable to access the site - the Internet equivalent to constantly dialing a phone number so that all other callers
get a busy signal. Once the ISP or website has been hacked, the computers at the ISP or website become
overburdened by demands for service and are unable to respond to legitimate users. As a result, the internet
service provider (ISP) or website is effectively shut down. Internet Service Providers (ISPs) and individual
websites are typically the targets of these attacks.
5. Rogue WI-FI Hotspots
From libraries and fast-food chains and coffeeshops, there are free Wi-Fi networks nearly everywhere. This
open networks are imitated by rogue Wi-Fi hotspots. These rogue networks are mostly found near legal free
hotspots and send out stronger signals, which many users unwittingly link to. Once linked, the rogue networks
collect all information submitted to legitimate sites by users, including user names and passwords.
6. Identity Theft
Identity stealing is the fraudulent use of another person's identity for financial gain. When a person's identity is
taken, the suspect obtains new credit cards under the victim's name. From Social Security numbers and dates of
birth to account records and passwords, identity hackers search for something that can help them steal
someone's identity. They often get this information from social networking sites, where people often share
personal details such as birth dates, family member names, home addresses, and so on. The easiest way to
protect yourself from identity hackers is to take discretion when providing information on social networking
sites and to make use of the privacy settings and controls available.
7. Internet Scams
A scam is a misleading or unethical act or activity that entices people into sharing personal information or
wasting time and resources with little or no benefit. An Internet fraud is basically a con that takes place over the
internet. Almost all Internet scams begin with a mass mailing to unwitting recipients.
Phishing is a common scam tactic used by con artists. Phishing is a method of deceiving Internet users into
believing a false yet official-looking website or e-mail is genuine. Phishing has advanced to the point that it now
replicates whole websites, such as PayPal, in an attempt to trick users into divulging their financial details.
8.Rootkits
A rootkit is a collection of programs that allows its user to obtain administrator-level access to advice without
the permission or knowledge of the end user. The rootkit allows attackers to execute files, access logs, track user
behavior, and alter the computer's configuration.
9.Spam
Spam e-mail is the practice of sending unsolicited e-mail to vast groups of individuals using email services. The
majority of spam is low-cost promotional advertisements, mostly for dubious goods like pornography, bogus
get-rich-quick schemes, and useless stock.
10. Phishing
Phishing is the malicious use of e-mail to try to get the user to share personal information. În a phishing scam, a
con artist sends out e-mails that appear to be from a reputable source, encouraging the user to take action in
order to avert undesirable repercussions or to earn a payout. Spear-phishing is a form of phishing in which the
phisher sends phony e-mails to employees of a specific company.
11. Adware - It's a piece of software that forces pre-selected advertisements to appear on a computer.
12. Attack - It is a procedure for gaining access to advice and extracting confidential data.
13. Back Door - This hidden access to a computer system or app, also known as a “trap door,” bypasses
authentication mechanisms such as logins and password defenses.
14. Botnet - It's a program that automates a task so that it can be carried out at a much faster pace and over a
longer period of time than a human operator might. Sending HTTP, FTP, or Telnet at a faster rate, or calling
script to generate objects at a faster rate, for example. A botnet, also known as a “zombie army,” is a collection
of computers that are managed without the knowledge of their users. Botnets are used to deliver spam and
launch distributed denial-of-service attacks.
15. Brute Force Attack - It is the easiest and most automatic way of gaining access to a device or website. It
repeatedly attempts various combinations of usernames and passwords before it succeeds.
16. Buffer Overflow - If more data is written to a block of memory or a buffer than the buffer is allocated to
contain, this is a mistake.
17. Clone Phishing - It is the addition of a false connection to an actual, valid e-mail in order to dupe the
receiver into sharing personal information.
18. Exploit Kit - It's a software framework that runs on Web servers to find software flaws in client computers
that communicate with it, then exploits those flaws to upload and execute malicious code on the client.
19. Exploit - It's a piece of software, a block of code, or a series of commands that exploits a flaw or loophole
in a device or network device to undermine its protection.
20. Firewall - A firewall is a security device that keeps unauthorized intruders out of a computer system or
network while allowing secure contact between devices and users on the inside.
21. Keystroke Logging - This is the procedure for keeping track of the keys pressing on a monitor (and which
touchscreen points are used). It's nothing more than a computer/human inter face map. Gray and black hat
hackers use it to keep track of login IDs and passwords. A Trojan sent via phishing e-mail is typically used to
install keyloggers on a computer.
22. Logic Bomb -It is a virus that is secreted into adevice and when those requirements are met, it performs a
malicious operation. The time bomb is the most popular variation of this.
23. Malware - It's a catch-all word for a wide range of malicious malware, from computer viruses, worms,
Trojan horses, malware, spyware, adware, scareware, and other malicious programs.
24. Master Program - This is the software that a black hat hacker uses to send orders to infected zombie drones
over the internet, usually to carryout DoS or spam attacks.
25. Phreakers - These was thought to be the first computer hackers. They are those who unlaw fully gain
access to the mobile network in order to make free long-distance calls or tap phone lines.
26. Shrink Wrap Code - This is the process of finding flaws in unpatched or incorrectly designed applications
and exploiting them.
27. Social Engineering -This entails deceiving others in order to obtain confidential and personal data such as
credit card numbers, usernames, and passwords.
28.Spoofing - It's a method of gaining unwanted access to computers in which an attacker sends messages to a
device with an IP address that indicates the message came from a trustworthy host.
29. Spyware - This is software that collects information about an individual or organization without their
permission and may transmit that information to another party without their consent, or that asserts authority
over a device without their knowledge.
30. SQL Injection - This is a SQL code injection technique for targeting data-driven applications in which
malicious SQL statements are inserted into an entry field for execution (for example, to dump the database
contents to the attacker).
31. Threat-It is a potential threat that can undermine the protection of a device or network system by exploiting
an internal flaw or weakness.
32. Vulnerability - This is a flaw that helps a hacker to break through a computer or network system's safe.
33. Cross-site Scripting (XSS) - This is a common form of computer security flaw found in Web applications.
Attackers may use XSS to insert client-side script into Web pages that are being used by other users.
34. Zombie Drone - It is described as a computer that has been hacked and is being used anonymously as a
soldier or “drone” for malicious purposes, such as sending unwanted spam e-mails.

PHASES OF CYBERSECURITY ATTACK


Six (6) Phases of Cybersecurity Attack
1. Reconnaissance- The attacker gathers information about a goal by active or passive means during this
process. Google dorks and Maltrgo are two commonly used method in this process.
2. Scanning- During this process, the attacker deliberately probes a target computer or network for
exploitable vulnerabilities. Nessus or Nexpose are the Method used in this phase.
3. Gaining access- The Vulnerability is discovered during this operation. The attacker tries to used it to
gain access to a device. Metasploit is the most important method in the operation.
4. Maintaining Access- when the has already obtained access to a device, this is the method. After
obtaining entry, the hacker sets up some backdoor to allow his access to the device in the future if he
wants it. In this method, Metasploit is the preferred tool.
5. Clearing Tracks- This is morally reprehensible procedure. It has to do with the removal of all logs of all
events that occur during the hacking process.
6. Reporting- This is the last move in the ethical hacking procedure. The ethical hacker compiles a paper
detailing his or her discoveries and the job that was completed, including the methods used, progress
rate, bugs discoveries, and exploit processes.
Elective 2
Prepared By: Stranger (A.G.A)

2nd prelim.
COMPUTER PRIVACY & CYBER CRIME
Cybersecurity awareness encourages basic knowledge of cyber vulnerabilities and risk, as a
cyber hygiene effective solution options. When people are faced with cyber threats, it educates them on best
practices and preventive steps.
Cyber understanding about cyber-related risk should be promoted among the general population, businesses,
and government employees.

A global repository will help improve the number and quality of national cybersecurity awareness
programs by streamlining and facilitating them. The archive should be preserved and revised on the general
basis to incorporate recent technical advancement and perspective.

People benefits greatly from technology, but it is often necessary to consider the negative, or possibly
negative, effect. Computer Technology must be implemented in such way that it gives effect are maximized and
its negative effects are minimized.

The technology commonly used to ensure network security:

a. Firewall- connection to a company’s intranet and other internal network is controlled by hardware and
software. All messages between the company’s internal network and the outside world are routed via a
proxy server, which is a special device. The proxy server determines whether it is secure to let a single
message or file flow into or out of the organizations network by analyzing the source and quality of each
contact.

b. Intrusion Detection System (IDS)- this is used in conjunction with firewall to secure a company’s
network. These program measures both incoming and outgoing network traffic using mathematical
techniques. An IDS can detect signs of network intrusion and block access before an attacker can do harm
using sophisticated pattern matching and heuristic.

c. Virtual Private Networks (VPN)- established a protected private link between a remote user and the
network of an enterprise. Between a user’s home or desktop computer and business server, special VPN
protocol create the equivalent of a dedicated thread. The link is strongly encrypted, and from the user’s
viewpoint, the workstation seems to be connected to the corporate network.

THE SOCIAL MEDIA


People can connect with each other via social media by building online communities where they can
exchange information, thoughts messages, and other material, such as image, audio and video.
Social Network Platforms
A social networking website brings together internet users to form an online community that allows
them to overcome challenges such as time, space and cultural differences. It enable people to communicate with
one another over the internet by sharing their thoughts, idea, knowledge, hobbies, and experiences.

You might also like