SlideShare a Scribd company logo
COMPUTER CRIME
TYPES OF ATTACKS Spam  – any unsolicited email. Usually considered a costly nuisance, spam now  often contains malware. Malware  is a class of malicious  software—viruses, worms, trojans,  and spyware—that is designed to infect computers and systems and steal critical information, delete applications, drives and files, or convert computers into an asset for an outsider or attacker.
TYPES OF ATTACKS Denial of service attack –  Malicious code that blocks service for users of a targeted system. The flood of incoming messages essentially forces the targeted system to shut down, thereby denying use  by legitimate users. Virus –  a form of malware that infects computers or other electronic devices,  making them unusable.
TYPES OF ATTACKS Phishing –  a form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user IDS and passwords by creating a website similar to that of a legitimate  organization, then directing email  traffic to the fraudulent site to harvest what should be private information for  financial or political gain.
TYPES OF ATTACKS Patches –  programs designed to fix software security flaws, often installed  automatically to reduce end-user  participation and increase ease of use. Click fraud  is a type of Internet crime that occurs in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad's link
TYPES OF ATTACKS IP SPOOFING-- It  refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system.   BOTNET-- A   botnet  is a collection of compromised computers connected to the Internet. Termed "bots," they are generally used for malicious purposes. Botnets are usually controlled via standards based network protocols such as IRC
TYPES OF ATTACKS Spyware  is software which sends information to its creators about a user's activities – typically passwords, credit card numbers and other information that can be sold on the black market.  Cyber stalking  is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group.
TYPES OF ATTACKS ATTACKS THROUGH SOCIAL NETWORKING SITES-- Photos and personal information posted are an easy target for hackers, and many users have already had their personal pages infiltrated. Norton warns against opening suspicious messages that appear to be from friends, and from giving out passwords.
TYPES OF ATTACKS "Terrorist instructions hidden online" and "Terror groups hide behind Web encryption". The above two statements highlights the misuse of technology STEGANOGRAPHY. Steganography  is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
TYPES OF ATTACKS Pharming -- H ackers lead users to bogus websites even if they’ve typed in their correct, intended URLs. Pharmers are more difficult to detect because they are not reliant upon the victim accepting a ‘bait’ message. Shortened web addresses  – users sometime are forced to clink on URLs that appear to have been shortened, they can lead to malware and infection.
TYPES OF ATTACKS Anonymous remailer It  is a server computer which receives messages with embedded instructions on where to send them next, and which forwards them without revealing where they originally came from. ActiveX controls These are capable of being programmed with malicious files such as viruses that can not only harm your computer but also transmit data such as passwords, credit card information to programmer.
Thank you!

More Related Content

PPTX
2014-09-03 Cybersecurity and Computer Crimes
PPT
Computer crimes and criminals
PPTX
Cyber Crime
PPT
Computer crime
PPT
Computer crime
PDF
Computer crimes
PPTX
Computer Crime
PPT
Computer crime
2014-09-03 Cybersecurity and Computer Crimes
Computer crimes and criminals
Cyber Crime
Computer crime
Computer crime
Computer crimes
Computer Crime
Computer crime

What's hot (20)

PPTX
Types Of Computer Crime
PPTX
[Exposicion] Computer and Internet Crime
PPTX
Computer Crimes
PPT
3e - Computer Crime
PPT
History and future cybercrime
PPT
Chapter 3 Computer Crimes
PPTX
Cyber crime
PPTX
Cybercrime: A Seminar Report
PPTX
CYBER CRIME
PPTX
Cybercrime
PPTX
Computer crime
PPTX
Cyber crime
PPTX
Cyber crime and security ppt
PPTX
Cyber crime
PPTX
Cyber Crime and Security Presentation
DOC
Assignment of cyber crimes for oumh1203
PPTX
Cyber Crime
PPTX
Cyber Crime
PPTX
Cyber Crime
PPTX
Cyber crime ppt
Types Of Computer Crime
[Exposicion] Computer and Internet Crime
Computer Crimes
3e - Computer Crime
History and future cybercrime
Chapter 3 Computer Crimes
Cyber crime
Cybercrime: A Seminar Report
CYBER CRIME
Cybercrime
Computer crime
Cyber crime
Cyber crime and security ppt
Cyber crime
Cyber Crime and Security Presentation
Assignment of cyber crimes for oumh1203
Cyber Crime
Cyber Crime
Cyber Crime
Cyber crime ppt
Ad

Similar to computer crime (20)

PPTX
Ppt on cyber security
PPTX
Cyber crime and cyber security
PPTX
Cyber crime & security
PPTX
types of cyber attack by taufiqurrahman.pptx
PDF
Ch 1 intro to cyber crime and cyber security.pdf
PPT
Cyber Crime & Security
PPTX
Cyber crime & security
PDF
Information Systems Audit - Auditing Information Systems
PPTX
week2-cybersecurityOverview of social engineering attacks.pptx
PPTX
Cyber security
PPTX
Cyber crime
PPTX
Nep bnu bca unit 2: Cyber Crimes and Cyber Law.pptx
PPTX
Malware attack Social engineering attack
DOCX
Cyber crime
PPT
ISDD - Security Risks
PPSX
Cyber crimes (By Mohammad Ahmed)
PPTX
Presentation on cyber security
PDF
Cyber Crime Types & Tips
PPTX
Cyber crimes
Ppt on cyber security
Cyber crime and cyber security
Cyber crime & security
types of cyber attack by taufiqurrahman.pptx
Ch 1 intro to cyber crime and cyber security.pdf
Cyber Crime & Security
Cyber crime & security
Information Systems Audit - Auditing Information Systems
week2-cybersecurityOverview of social engineering attacks.pptx
Cyber security
Cyber crime
Nep bnu bca unit 2: Cyber Crimes and Cyber Law.pptx
Malware attack Social engineering attack
Cyber crime
ISDD - Security Risks
Cyber crimes (By Mohammad Ahmed)
Presentation on cyber security
Cyber Crime Types & Tips
Cyber crimes
Ad

Recently uploaded (20)

PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
STKI Israel Market Study 2025 version august
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
1 - Historical Antecedents, Social Consideration.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Unlock new opportunities with location data.pdf
PPTX
The various Industrial Revolutions .pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Modernising the Digital Integration Hub
PDF
Assigned Numbers - 2025 - Bluetooth® Document
O2C Customer Invoices to Receipt V15A.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
observCloud-Native Containerability and monitoring.pptx
STKI Israel Market Study 2025 version august
DP Operators-handbook-extract for the Mautical Institute
1 - Historical Antecedents, Social Consideration.pdf
search engine optimization ppt fir known well about this
A review of recent deep learning applications in wood surface defect identifi...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Group 1 Presentation -Planning and Decision Making .pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Unlock new opportunities with location data.pdf
The various Industrial Revolutions .pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
WOOl fibre morphology and structure.pdf for textiles
Enhancing emotion recognition model for a student engagement use case through...
Modernising the Digital Integration Hub
Assigned Numbers - 2025 - Bluetooth® Document

computer crime

  • 2. TYPES OF ATTACKS Spam – any unsolicited email. Usually considered a costly nuisance, spam now often contains malware. Malware is a class of malicious software—viruses, worms, trojans, and spyware—that is designed to infect computers and systems and steal critical information, delete applications, drives and files, or convert computers into an asset for an outsider or attacker.
  • 3. TYPES OF ATTACKS Denial of service attack – Malicious code that blocks service for users of a targeted system. The flood of incoming messages essentially forces the targeted system to shut down, thereby denying use by legitimate users. Virus – a form of malware that infects computers or other electronic devices, making them unusable.
  • 4. TYPES OF ATTACKS Phishing – a form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user IDS and passwords by creating a website similar to that of a legitimate organization, then directing email traffic to the fraudulent site to harvest what should be private information for financial or political gain.
  • 5. TYPES OF ATTACKS Patches – programs designed to fix software security flaws, often installed automatically to reduce end-user participation and increase ease of use. Click fraud is a type of Internet crime that occurs in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad's link
  • 6. TYPES OF ATTACKS IP SPOOFING-- It  refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system. BOTNET-- A   botnet  is a collection of compromised computers connected to the Internet. Termed "bots," they are generally used for malicious purposes. Botnets are usually controlled via standards based network protocols such as IRC
  • 7. TYPES OF ATTACKS Spyware  is software which sends information to its creators about a user's activities – typically passwords, credit card numbers and other information that can be sold on the black market.  Cyber stalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group.
  • 8. TYPES OF ATTACKS ATTACKS THROUGH SOCIAL NETWORKING SITES-- Photos and personal information posted are an easy target for hackers, and many users have already had their personal pages infiltrated. Norton warns against opening suspicious messages that appear to be from friends, and from giving out passwords.
  • 9. TYPES OF ATTACKS "Terrorist instructions hidden online" and "Terror groups hide behind Web encryption". The above two statements highlights the misuse of technology STEGANOGRAPHY. Steganography  is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
  • 10. TYPES OF ATTACKS Pharming -- H ackers lead users to bogus websites even if they’ve typed in their correct, intended URLs. Pharmers are more difficult to detect because they are not reliant upon the victim accepting a ‘bait’ message. Shortened web addresses – users sometime are forced to clink on URLs that appear to have been shortened, they can lead to malware and infection.
  • 11. TYPES OF ATTACKS Anonymous remailer It is a server computer which receives messages with embedded instructions on where to send them next, and which forwards them without revealing where they originally came from. ActiveX controls These are capable of being programmed with malicious files such as viruses that can not only harm your computer but also transmit data such as passwords, credit card information to programmer.