2. Computer Applications in
the Society
Education/Research
Finance
Government
Healthcare
Science
Publishing
Travel
Industry Personal Communication
Enterprise
5. Malware
(malicious software)
Viruses
Rogue software program that attaches itself to other software
programs or data files in order to be executed
Worms
Independent computer programs that copy themselves from
one computer to other computers over a network.
Trojan horses
Software program that appears to be benign but then does
something other than expected.
6. Malware
(malicious software)
SQL injection attacks
Hackers submit data to Web forms that exploits site’s
unprotected software and sends rogue SQL query to
database
Spyware
Small programs install themselves surreptitiously on
computers to monitor user Web surfing activity and
serve up advertising
Key loggers
Record every keystroke on computer to steal serial
numbers, passwords, launch Internet attacks
7. Hackers and Computer Crime
Hackers vs. crackers
• System intrusion
• System damage
• Cyber vandalism: Intentional disruption,
defacement, destruction of Web site or
corporate information system
7
8. Computer Crime
Spoofing
Misrepresenting oneself by using fake e-mail
addresses or masquerading as someone else
Redirecting Web link to address different from
intended one, with site masquerading as intended
destination
Sniffer
Eavesdropping program that monitors information
traveling over network
Enables hackers to steal proprietary information
such as e-mail, company files, etc.
9. Computer Crime
Denial-of-service attacks (DoS)
• Flooding server with thousands of false requests to
crash the network.
Distributed denial-of-service attacks (DDoS)
• Use of numerous computers to launch a DoS
10. DoS utilizes a single connection, while a DDoS attack
utilizes many sources of attack traffic
11. Computer Crime
Defined as “any violations of criminal law that involve
a knowledge of computer technology for their
perpetration, investigation, or prosecution”
Computer may be target of crime, e.g.:
Breaching confidentiality of protected computerized data
Accessing a computer system without authority
Computer may be instrument of crime, e.g.:
Theft of trade secrets
Using e-mail for threats or harassment
12. Computer Crime
Identity theft
• Theft of personal Information (social security id,
driver’s license or credit card numbers) to
impersonate someone else
Phishing
• Setting up fake Web sites or sending e-mail
messages that look like legitimate businesses to ask
users for confidential personal data.
Evil twins
• Wireless networks that pretend to offer trustworthy
Wi-Fi connections to the Internet
13. Computer Crime
Pharming
• Redirects users to a bogus Web page, even when
individual types correct Web page address into his
or her browser
Click fraud
• Occurs when individual or computer program
fraudulently clicks on online ad without any
intention of learning more about the advertiser or
making a purchase
Cyber terrorism and Cyber warfare
14. Proof of Computer Crime
Electronic evidence
• Evidence for white collar crimes often in digital form
Data on computers, e-mail, instant messages, e-
commerce transactions
• Proper control of data can save time and money when
responding to legal discovery request
Computer forensics:
• Scientific collection, examination, authentication,
preservation, and analysis of data from computer
storage media for use as evidence in court of law
• Includes recovery of ambient and hidden data
15. What are Cyber Crime?
Improperly accessing a computer, system, or network;
Modifying, damaging, using, disclosing, copying, or
taking programs or data;
Introducing a virus or other contaminant into a
computer system;
Interfering with someone else's computer access or use;
Falsifying email source information; and
Stealing an information service from a provider.
16. Offences against computer data and systems
Misuse of computer devices
Computer-related forgery
Computer-related fraud
Child Pornography
Offences related to infringements of copyright
and related rights
What are Cyber Crime?
17. Hacker Targets
Financial data
Intellectual Property
Personal data
System Access
Theft, modification or sale,
blackmail
Theft, sale, personal gain
Modification, sale
Sabotage, backdoors,
exploitation
18. What the Law of Bangladesh
Says?
If a person intentionally causes loss or damage
to any other person or organization by
any act which destroys, deletes or alters any
information residing in a computer resource or
diminishes its value or affects it by any means,
would be considered to have engaged in
hacking.
19. Information Security
Security: Policies, procedures and technical
measures used to prevent unauthorized
access, alteration, theft, or physical damage to
information systems:
Physical Security
Network Security
Data Security
20. What Is Network Security?
"Network security" refers to any activity designed
to protect the usability and integrity of your
network and data. It includes both hardware and
software technologies. Effective network security
manages access to the network. It targets a variety
of threats and stops them from entering or
spreading on your network.
21. Types of network security
Access control
Antivirus and antimalware software
Application security
Data loss prevention
Email security
Mobile device security
Security information and event management
22. What is data security?
Data security concerns the protection of data from
accidental or intentional but unauthorized modification,
destruction or disclosure through the use of physical
security, administrative controls, logical controls,
and other safeguards to limit accessibility.
23. Technologies and Tools for
Protecting Information Resources
Firewall:
• Combination of hardware and software
that prevents unauthorized users from
accessing private networks
• Technologies include:
Static packet filtering
Network address translation (NAT)
Application proxy filtering
24. Technologies and Tools for
Protecting Information Resources
Intrusion detection systems:
• Monitor hot spots on corporate networks to detect and
deter intruders
• Examines events as they are happening to discover
attacks in progress
Antivirus and antispyware software:
• Checks computers for presence of malware and can
often eliminate it as well
• Require continual updating
Unified threat management (UTM) systems
25. Technologies and Tools for
Protecting Information Resources
Securing wireless networks
- Continually changing keys
- Encrypted authentication system with
central server
26. Encryption:
• Transforming text or data into cipher text
that cannot be read by unintended
recipients
Technologies and Tools for Protecting
Information Resources
27. Technologies and Tools for
Protecting Information Resources
Digital certificate:
Data file used to establish the identity of users and
electronic assets for protection of online transactions
Uses a trusted third party, certification authority (CA),
to validate a user’s identity
CA verifies user’s identity, stores information in CA
server, which generates encrypted digital certificate
containing owner ID information and copy of owner’s
public key
28. Safe and Ethical Uses of Computers
Ethics
• Principles of right and wrong that individuals, acting
as free moral agents, use to make choices to guide
their behaviors
Professional codes of conduct
• Promulgated by associations of professionals
E.g. AMA, ABA, AITP, ACM
• Promises by professions to regulate themselves in the
general interest of society
29. Property Rights:
Intellectual Property
Trade secret: Intellectual work or product
belonging to business, not in the public domain.
Copyright: Statutory grant protecting intellectual
property from being copied for the life of the author,
plus 70 years.
Patents: Grants creator of invention an exclusive
monopoly on ideas behind invention for 20 years