SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
Computer Vandalism
BY, ADITYA SINGH
Computer vandalism is a process wherein there is a program that performs
malicious function such as extracting a user's password or other data or erasing
the hard disk. A vandal differs from a virus, which attaches itself to an existing
executable program. The vandal is the full executing entity itself, which can be
downloaded from the Internet in the form of an ActiveX control, Java applet,
browser plug-in or e-mail attachment.
Who are the computer vandals?
In the early days of the development of malware, the majority of
computer viruses and Trojans were created by students and other young
programmers – plus some older, more experienced programmers. Today,
there are still four main types of computer vandal:
 Skilled students… showing off!
In many cases, students – that have just mastered the use of a
programming language – may want to try out their skills, test their ability
or prove how clever they are. Fortunately, many of these malware
do not actually distribute their malware – instead, they may send the
or worm virus to an antivirus company.
 Inexperienced youths… assisted by the Internet
Young people that haven’t quite mastered the art of programming may
also turn to computer vandalism – sometimes to prove their ‘self-worth’.
In the past, this resulted in primitive viruses. However, there are now
numerous websites that explain how to write and distribute computer
viruses – and how viruses can sidestep antivirus software. So the Internet
has made it much easier for the inexperienced to create their own
 ‘Professional developers’
As young virus writers mature, their experience can make their activities
much more dangerous. Older, talented programmers can create very
‘professional’ computer viruses. These can be sophisticated programs
use innovative methods to intrude into data system domains, or can
exploit security vulnerabilities within operating environments, capitalise
on social engineering or use a range of other tricks.
 Researchers
These are shrewd programmers that are capable of inventing new methods of
infecting computers, concealing the infection and resisting the actions of
antivirus software. The programmer’s objective is to research the potential of
‘computer fauna’. The programmer may choose not to spread their creations –
but actively promote their ideas, via numerous Internet resources that are
devoted to the creation of computer viruses. Those ideas and ‘research viruses’
may then be used by malicious individuals or criminals.
United States v. Robert T. Morris, 1991
Robert Morris was one of the first to be prosecuted under the Computer Fraud and Abuse Act
of 1986. As a Cornell University graduate student, Morris wrote and released onto the Internet
a "worm" program designed to propagate itself automatically without harm to the host
computers, but due to a flaw in its design, the Morris worm caused thousands of computers
nationwide to crash on November 2-3, 1988. By itself, the worm did no permanent damage,
although the estimated cost of rectifying its effects at each location involved ranged from $200
to $53,000. As a graduate student in the Cornell University computer science department, he
full and legal access to all the department's computing facilities; these facilities were connected
to the Internet.
Although Morris' defense claimed the worm was a benign test of computer security that went
wrong, Morris was convicted on the grounds that he intentionally accessed remote computers
without authorization. He was sentenced to 3 years probation, fined $10,050, and ordered to
perform 400 hours of community service, a sentence far less than the maximum permissible
under law. The conviction later was upheld by a federal appeals court, and review was denied
the Supreme Court.
SOURCE: United States v. Robert T. Morris, No. 89-CR-139 (N.D.N.Y.), aff'd 928 F.2d 504 (2nd
Cir. 1991), cert. denied, 112 S. Ct. 72 (1991).

More Related Content

PPTX
Hacking vs cracking
PPT
Cyber crime and fraud
PPTX
Cyber crime ppt
PPTX
Phishing ppt
PPTX
Introduction to Cyber Crime
DOC
Report of cyber crime
PPTX
Computer crime
PPTX
Cybersecurity 2 cyber attacks
Hacking vs cracking
Cyber crime and fraud
Cyber crime ppt
Phishing ppt
Introduction to Cyber Crime
Report of cyber crime
Computer crime
Cybersecurity 2 cyber attacks

What's hot (20)

PPT
Cybercrime presentation
PPTX
Cybercrime.ppt
PPT
Cyber crime & security final tapan
PPTX
Cyber Crime
PPTX
Virus and Worms
PPSX
Hacking
PPTX
Computer Project on Cyber Safety
PPTX
Cyber crime
PPTX
Cyber attack
PPTX
Cyber crime and security
PPTX
Cyber crime
PPTX
Cyber crime in india
PPT
PPT
Computer Malware
DOCX
A report on cyber Crime
PPTX
PPT
presentation on cyber crime and security
PPT
CYBER CRIME
PPTX
Password sniffing
PPT
Ethical hacking
Cybercrime presentation
Cybercrime.ppt
Cyber crime & security final tapan
Cyber Crime
Virus and Worms
Hacking
Computer Project on Cyber Safety
Cyber crime
Cyber attack
Cyber crime and security
Cyber crime
Cyber crime in india
Computer Malware
A report on cyber Crime
presentation on cyber crime and security
CYBER CRIME
Password sniffing
Ethical hacking
Ad

Similar to Computer Vandalism (20)

PDF
Eh34803812
PPTX
What is a virus and anti virus
PPTX
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
PDF
Virus detection based on virus throttle technology
PPTX
Viruses
PDF
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
DOC
Web virus activity
PDF
The process of computer security
PPTX
Computer security threats & prevention
PPT
computer vipin kumar ppt
PPT
Presentation24190
PDF
Threats of Computer System and its Prevention
PDF
4 threatsandvulnerabilities
PDF
Computer crimes
DOC
Computer worm
DOC
Computer worm
DOCX
Computer viruses by joy chakraborty
PPT
Computer Virus
PPTX
Computer crime and internet crime privacy
DOC
Malware
Eh34803812
What is a virus and anti virus
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
Virus detection based on virus throttle technology
Viruses
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
Web virus activity
The process of computer security
Computer security threats & prevention
computer vipin kumar ppt
Presentation24190
Threats of Computer System and its Prevention
4 threatsandvulnerabilities
Computer crimes
Computer worm
Computer worm
Computer viruses by joy chakraborty
Computer Virus
Computer crime and internet crime privacy
Malware
Ad

Recently uploaded (20)

PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Trump Administration's workforce development strategy
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
IGGE1 Understanding the Self1234567891011
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Introduction to Building Materials
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
Empowerment Technology for Senior High School Guide
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Lesson notes of climatology university.
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
RMMM.pdf make it easy to upload and study
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Final Presentation General Medicine 03-08-2024.pptx
Trump Administration's workforce development strategy
LDMMIA Reiki Yoga Finals Review Spring Summer
IGGE1 Understanding the Self1234567891011
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Weekly quiz Compilation Jan -July 25.pdf
Final Presentation General Medicine 03-08-2024.pptx
Introduction to Building Materials
Digestion and Absorption of Carbohydrates, Proteina and Fats
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Empowerment Technology for Senior High School Guide
Unit 4 Skeletal System.ppt.pptxopresentatiom
Indian roads congress 037 - 2012 Flexible pavement
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Lesson notes of climatology university.
A systematic review of self-coping strategies used by university students to ...
RMMM.pdf make it easy to upload and study
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE

Computer Vandalism

  • 2. Computer vandalism is a process wherein there is a program that performs malicious function such as extracting a user's password or other data or erasing the hard disk. A vandal differs from a virus, which attaches itself to an existing executable program. The vandal is the full executing entity itself, which can be downloaded from the Internet in the form of an ActiveX control, Java applet, browser plug-in or e-mail attachment. Who are the computer vandals? In the early days of the development of malware, the majority of computer viruses and Trojans were created by students and other young programmers – plus some older, more experienced programmers. Today, there are still four main types of computer vandal:
  • 3.  Skilled students… showing off! In many cases, students – that have just mastered the use of a programming language – may want to try out their skills, test their ability or prove how clever they are. Fortunately, many of these malware do not actually distribute their malware – instead, they may send the or worm virus to an antivirus company.  Inexperienced youths… assisted by the Internet Young people that haven’t quite mastered the art of programming may also turn to computer vandalism – sometimes to prove their ‘self-worth’. In the past, this resulted in primitive viruses. However, there are now numerous websites that explain how to write and distribute computer viruses – and how viruses can sidestep antivirus software. So the Internet has made it much easier for the inexperienced to create their own
  • 4.  ‘Professional developers’ As young virus writers mature, their experience can make their activities much more dangerous. Older, talented programmers can create very ‘professional’ computer viruses. These can be sophisticated programs use innovative methods to intrude into data system domains, or can exploit security vulnerabilities within operating environments, capitalise on social engineering or use a range of other tricks.  Researchers These are shrewd programmers that are capable of inventing new methods of infecting computers, concealing the infection and resisting the actions of antivirus software. The programmer’s objective is to research the potential of ‘computer fauna’. The programmer may choose not to spread their creations – but actively promote their ideas, via numerous Internet resources that are devoted to the creation of computer viruses. Those ideas and ‘research viruses’ may then be used by malicious individuals or criminals.
  • 5. United States v. Robert T. Morris, 1991 Robert Morris was one of the first to be prosecuted under the Computer Fraud and Abuse Act of 1986. As a Cornell University graduate student, Morris wrote and released onto the Internet a "worm" program designed to propagate itself automatically without harm to the host computers, but due to a flaw in its design, the Morris worm caused thousands of computers nationwide to crash on November 2-3, 1988. By itself, the worm did no permanent damage, although the estimated cost of rectifying its effects at each location involved ranged from $200 to $53,000. As a graduate student in the Cornell University computer science department, he full and legal access to all the department's computing facilities; these facilities were connected to the Internet. Although Morris' defense claimed the worm was a benign test of computer security that went wrong, Morris was convicted on the grounds that he intentionally accessed remote computers without authorization. He was sentenced to 3 years probation, fined $10,050, and ordered to perform 400 hours of community service, a sentence far less than the maximum permissible under law. The conviction later was upheld by a federal appeals court, and review was denied the Supreme Court. SOURCE: United States v. Robert T. Morris, No. 89-CR-139 (N.D.N.Y.), aff'd 928 F.2d 504 (2nd Cir. 1991), cert. denied, 112 S. Ct. 72 (1991).