SlideShare a Scribd company logo
Computer Fundamentals
Lecture # 9:
Cyber Crime
Today’s Aim
 Different aspects of Cyber Crimes
 DoS Attack
 Viruses
 Pirated Software
 Victims of Cyber Crimes
DoS (Denial of service) – A Case
Study
 is an attempt to make a machine or network
resource unavailable to its intended user
 Feb 7, 2000 – DoS
 No Response from Yahoo’s Server
 Hit- Rate higher than on an Important Event
 No Computer Got Broken Into
 No User Data was Manipulated
Three Phases of DoS
 Search
 SW used to search weak servers which are used
as Drones
 Drones are used to Scan other servers
 Arm
 Conquered Drones Loaded with the DoS SW
 The attack may either be ‘triggered’ (Command
Dependent) or ‘scheduled’ (Time Dependent)
Three Phases of DoS
 Attack
 At the Wake-up Call, Drones Release Large no. of
Packets
 Packets are Similar with no Quality Info
 Responding to Packets Overburdens the
Destination Servers
Neutralizing DoS
 Key Characteristics of Incoming Packets
Analyzed
 Packets Filtering
 IP Address Spoofing (IP address spoofing or IP spoofing
refers to the creation of Internet Protocol (IP) packets with a forged source
IP address, called spoofing, with the purpose of concealing the identity of
the sender )
 For the DoS Attack of Feb 2007, Neutralizing
took 3 hours.
 A "denial-of-service" attack is characterized
by an explicit attempt by attackers to prevent
legitimate (lawful) users of a service from
using that service.
 There are two general forms of DoS attacks:
those that crash services and those that flood
services.
 A DoS attack can be perpetrated (carry out)
in a number of ways. The five basic types of
attack are:
 Consumption of computational resources,
such as bandwidth, disk space, or processor
time.
 Disruption of configuration information, such
as routing information.
Continued…
 Disruption of state information, such as
unsolicited (not requested) resetting of TCP
sessions (see next slide).
 Disruption of physical network components.
 Obstructing the communication media
between the intended users and the victim so
that they can no longer communicate
adequately.
When you connect to another computer or device on a network or the
Internet, a link between you and that machine must be created to be
able to pass any data ( files, email, web, etc).
That link is called a TCP session. It does many things, like make sure
the machines you want to connect to is really the one you want to (
there are millions of computers on the Internet).
Also checks that every data you receive or send is not corrupted or lost.
If it happens, then sends the data segment again.
It also checks if the other machines is still online. If it's not, your
computer will tell you that you have lost connection, or something like
that.
TCP Session function
Various aspects of Cyber Crimes
 Unauthorized Access
 Info Theft
 E-Mail Bombing & Spoofing
 Denial of Service
 Virus/Worm Attacks
 Logic Bombs(In a computer program, a logic bomb, also called slag code, is programming code,
inserted intentionally, that is designed to execute (or "explode") under circumstances such as the lapse of a certain amount
of time or the failure of a program user to respond to a program command.)
 Trojan Attacks (Web hacking)
 Software Piracy
 Cyber Stalking (It is the use of the Internet or other electronic means to stalk or harass an
individual, a group of individuals, or an organization.)
Victims
 Individuals
 Organizations
 Countries
 Societies
Victims – Individuals
 Harassment via e-mails.
 Cyber-stalking.
 Dissemination (broadcasting without f/back)
of obscene (utterly ridiculous) material
 Defamation.
 Unauthorized control/access over computer
system.
 Email spoofing
 Cheating & Fraud
 Computer Vandalism (a program that performs malicious function such as extracting a
user's password or other data or erasing the hard disk.)
Victims – Organizations
 Unauthorized control/access over computer
system
 Possession of unauthorized information.
 Cyber terrorism against the government
organization.
 Distribution of pirated software etc.
Victims – Countries
 Vulnerable sectors include:
 Telecom
 Finance
 Defense Related Systems
Victims – Societies
 Trafficking
 Financial crime e.g., credit card frauds
 Sale of illegal articles
 Online gambling
Cyber War
 California’s 911 Service shut down
 US Navy Warship controlled by Hackers
 US NSA hired 35 Hackers to Check DoD’s
N/W’s Security
 Wiki Leaks
Cyber Warfare
 A Threat
 An Opportunity
 Nations Involved
Cyberwarfare refers to politically motivated hacking to conduct sabotage
(deliberately destroying). It is a form of information warfare sometimes
seen as analogous to conventional warfare, although this analogy is
controversial for both its accuracy and its political motivation.
U.S. government security expert Richard A. Clarke, in his book Cyber
War (May 2010), defines "cyberwarfare" as "actions by a nation-state to
penetrate another nation's computers or networks for the purposes of
causing damage or disruption.
A Look at the Most
Common Cyber
Crimes
E- Mail Bombing
 Similar to DoS
 Purpose - Overloading of destination account
 Can Shut-down a poorly-designed eMail
system/ server
 Can tie up the telecom channel for long
periods
 Defense: email filtering
Email Spoofing
 Using Forgery (illegal modifications) to Use
Someone Else’s Account Name
 Purpose:
 Revenge
 Financial Frauds
 Defense:
 Confirmation With the Sender
Unauthorized Access
 Sometimes Referred to as Hacking
 Purpose:
 Steal info
 Plant malicious programs
 Delete Files
 Defense:
 Intrusion detectors(An intrusion detection system (IDS) is a device or software application
that monitors network or system activities for malicious activities or policy violations and produces reports to a
Management Station.)
 Complex Passwords
Credit Card Fraud
 eCommerce server break-in
 Using Stolen Credit Card No.s:
 Online Shopping
 Credit Card Auction
 Defense:
 Single-use credit card numbers
 Single Transaction Credit Card Numbers
Piracy
 Using SW Without Author’s Permission
 Using SW for Unauthorized Use
 Defense: Authentication Techniques
Industrial Espionage(Spying)
 Spying over a Competitors Business
 Monitors data coming in and out of your
private network
 Defense:
 Private networks
 Encryption
 Network Sniffers (is a computer program or a piece of computer hardware that can intercept
and log traffic passing over a digital network or part of a network)
Web Store Spoofing
 Fake Web stores
 Customers’ Credit Card Info Obtained
 Defense: Never Trust A Stranger
Virus
 Self-replicating SW (replicate itself and
spread from one pc to another)
 Elusive (difficult to describe)
 Dependent(Executable-infecting viruses are dependent on users exchanging software or boot-
able floppies, so they spread rapidly in computer hobbyist circles.)
 Infects files on a computers through:
 Storage Media
 Networks
Virus Classification
 Malicious
 May destroy or broadcast private data
 May clog-up (obstructed) the communication
channels
 May tie-up the microprocessor to stop it from
doing useful work
 Harmless
 e.g., funny prompts, annoying but cause no
system crash
Virus Anatomy(structure wise analysis)
 Transmission Mechanism
 Travel Through Hosts
 Become Active when Host File Executed
 Payload(The payload is what the computer virus is programmed to do. Some viruses do nothing more than
copy themselves onto another PC, much like a real virus does from host to host. This is the simplest payload that a virus can
have. However, just like viruses in nature, some computer viruses have a greater effect - maybe they steal files or data or
allow someone else to take control over the PC while some will destroy some or all of the data on the computer.)
 Contains Malicious Instructions
 Infection propagation component
 Actual destructive component
Other Virus-Like Programs
 Trojan Horses
 Logic- and Time- Bombs
 Worms
Trojan Horses
 Stand-alone programs
 A Trojan horse, or Trojan, is a malicious application that appear as a legitimate file or helpful program but whose real
purpose is, for example, to grant a hacker unauthorized access to a computer. Trojans do not attempt to inject themselves
into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems
 Types:
 Password Trojans
 Privileges- Elevating Trojans
 Key Loggers
 Destructive Trojans
 Joke Programs
 Back Orifice
 NetBus
Logic- or Time- Bombs
 A logic bomb is a piece of code intentionally inserted into a software system that will set off a
malicious function when specified conditions are met. For example, a programmer may hide a
piece of code that starts deleting files (such as a salary database in a company)
 Execution Event Predetermined
 Example events:
 Command
 Time
Worms
 Independent Programs
 Harmless Instructions
 Harmful duplication
 Types:
 Rabbits
 Octopus
World famous Worms & Viruses
 1988 – the Internet Worm
 1989 – the Span Network Worm
 1997 – the Tree Christmas Worm
 1998 – Chernobyl
 1999 – Melissa, ExploreZip
 2000 – “The Love Bug”
 2000 – Pakistani Brain

More Related Content

PPTX
Network security presentation
PPT
CyberSecurity presentation for basic knowledge about this topic
PPTX
Cyber security
PPTX
DOC-20250311-WA00nnjnnnnnnnnnnnnnnnnnn..pptx
PPT
Chapter 3 Computer Crimes
PPTX
Security threats
PPTX
Cyber crime ppt
PPT
Citi NCR-Gurgaon 2010 -Presentation2.ppt
Network security presentation
CyberSecurity presentation for basic knowledge about this topic
Cyber security
DOC-20250311-WA00nnjnnnnnnnnnnnnnnnnnn..pptx
Chapter 3 Computer Crimes
Security threats
Cyber crime ppt
Citi NCR-Gurgaon 2010 -Presentation2.ppt

Similar to Lecture8 to identify the (Cyber Crime).ppt (20)

PPTX
Tools and methods used in cybercrime
PDF
Chapter 2 konsep dasar keamanan
PPT
L N Yadav Cyber SECURITY2.ppt
PPT
L N Yadav Cyber SECURITY.ppt
PDF
Chapter 2 konsep dasar keamanan
PPTX
APpresebtstuobvghgftytfhyrfyttrfgPT.pptx
PPTX
SIEM Fundamentals-Session 1 presentations
PPT
Hacking
PPT
PPT
2hacking.ppt
PPTX
Cybersecurity2021
PPTX
Ethical hacking ppt
PPTX
Module 1_ Introduction to Cyber Security.pptx
PPT
CyberAttack -- Whose side is your computer on?
PPTX
CYBERCRIMEDEFINATIONMEANINGANDHISTORY.pptx
PPTX
Cyber crimes
PPTX
cyber security
PDF
Security
Tools and methods used in cybercrime
Chapter 2 konsep dasar keamanan
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY.ppt
Chapter 2 konsep dasar keamanan
APpresebtstuobvghgftytfhyrfyttrfgPT.pptx
SIEM Fundamentals-Session 1 presentations
Hacking
2hacking.ppt
Cybersecurity2021
Ethical hacking ppt
Module 1_ Introduction to Cyber Security.pptx
CyberAttack -- Whose side is your computer on?
CYBERCRIMEDEFINATIONMEANINGANDHISTORY.pptx
Cyber crimes
cyber security
Security
Ad

More from engrkarimullah5806 (7)

PPTX
LAB#06 TASK presenta(MILKY WAY GALAXY).pptx
PPT
Lecture5 microprocessor (Microprocessor).ppt
PPT
Lecture7 for b(Computer Networks-Part2).ppt
PPT
Lecture6 for students (computer software).ppt
PPT
Lecture7 for (Computer Networks-Part1).ppt
PPT
Lecture3(Components of a computer)hhhf.ppt
PPTX
COMPUTER FUNDAMENTAL LAB REPORT FOR 1ST SEM
LAB#06 TASK presenta(MILKY WAY GALAXY).pptx
Lecture5 microprocessor (Microprocessor).ppt
Lecture7 for b(Computer Networks-Part2).ppt
Lecture6 for students (computer software).ppt
Lecture7 for (Computer Networks-Part1).ppt
Lecture3(Components of a computer)hhhf.ppt
COMPUTER FUNDAMENTAL LAB REPORT FOR 1ST SEM
Ad

Recently uploaded (20)

PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPT
Ethics in Information System - Management Information System
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Paper PDF World Game (s) Great Redesign.pdf
Ethics in Information System - Management Information System
artificialintelligenceai1-copy-210604123353.pptx
Mathew Digital SEO Checklist Guidlines 2025
522797556-Unit-2-Temperature-measurement-1-1.pptx
Introuction about ICD -10 and ICD-11 PPT.pptx
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
introduction about ICD -10 & ICD-11 ppt.pptx
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
international classification of diseases ICD-10 review PPT.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline
Exploring VPS Hosting Trends for SMBs in 2025
Tenda Login Guide: Access Your Router in 5 Easy Steps

Lecture8 to identify the (Cyber Crime).ppt

  • 2. Today’s Aim  Different aspects of Cyber Crimes  DoS Attack  Viruses  Pirated Software  Victims of Cyber Crimes
  • 3. DoS (Denial of service) – A Case Study  is an attempt to make a machine or network resource unavailable to its intended user  Feb 7, 2000 – DoS  No Response from Yahoo’s Server  Hit- Rate higher than on an Important Event  No Computer Got Broken Into  No User Data was Manipulated
  • 4. Three Phases of DoS  Search  SW used to search weak servers which are used as Drones  Drones are used to Scan other servers  Arm  Conquered Drones Loaded with the DoS SW  The attack may either be ‘triggered’ (Command Dependent) or ‘scheduled’ (Time Dependent)
  • 5. Three Phases of DoS  Attack  At the Wake-up Call, Drones Release Large no. of Packets  Packets are Similar with no Quality Info  Responding to Packets Overburdens the Destination Servers
  • 6. Neutralizing DoS  Key Characteristics of Incoming Packets Analyzed  Packets Filtering  IP Address Spoofing (IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender )  For the DoS Attack of Feb 2007, Neutralizing took 3 hours.
  • 7.  A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate (lawful) users of a service from using that service.  There are two general forms of DoS attacks: those that crash services and those that flood services.
  • 8.  A DoS attack can be perpetrated (carry out) in a number of ways. The five basic types of attack are:  Consumption of computational resources, such as bandwidth, disk space, or processor time.  Disruption of configuration information, such as routing information.
  • 9. Continued…  Disruption of state information, such as unsolicited (not requested) resetting of TCP sessions (see next slide).  Disruption of physical network components.  Obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
  • 10. When you connect to another computer or device on a network or the Internet, a link between you and that machine must be created to be able to pass any data ( files, email, web, etc). That link is called a TCP session. It does many things, like make sure the machines you want to connect to is really the one you want to ( there are millions of computers on the Internet). Also checks that every data you receive or send is not corrupted or lost. If it happens, then sends the data segment again. It also checks if the other machines is still online. If it's not, your computer will tell you that you have lost connection, or something like that. TCP Session function
  • 11. Various aspects of Cyber Crimes  Unauthorized Access  Info Theft  E-Mail Bombing & Spoofing  Denial of Service  Virus/Worm Attacks  Logic Bombs(In a computer program, a logic bomb, also called slag code, is programming code, inserted intentionally, that is designed to execute (or "explode") under circumstances such as the lapse of a certain amount of time or the failure of a program user to respond to a program command.)  Trojan Attacks (Web hacking)  Software Piracy  Cyber Stalking (It is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization.)
  • 13. Victims – Individuals  Harassment via e-mails.  Cyber-stalking.  Dissemination (broadcasting without f/back) of obscene (utterly ridiculous) material  Defamation.  Unauthorized control/access over computer system.  Email spoofing  Cheating & Fraud  Computer Vandalism (a program that performs malicious function such as extracting a user's password or other data or erasing the hard disk.)
  • 14. Victims – Organizations  Unauthorized control/access over computer system  Possession of unauthorized information.  Cyber terrorism against the government organization.  Distribution of pirated software etc.
  • 15. Victims – Countries  Vulnerable sectors include:  Telecom  Finance  Defense Related Systems
  • 16. Victims – Societies  Trafficking  Financial crime e.g., credit card frauds  Sale of illegal articles  Online gambling
  • 17. Cyber War  California’s 911 Service shut down  US Navy Warship controlled by Hackers  US NSA hired 35 Hackers to Check DoD’s N/W’s Security  Wiki Leaks
  • 18. Cyber Warfare  A Threat  An Opportunity  Nations Involved Cyberwarfare refers to politically motivated hacking to conduct sabotage (deliberately destroying). It is a form of information warfare sometimes seen as analogous to conventional warfare, although this analogy is controversial for both its accuracy and its political motivation. U.S. government security expert Richard A. Clarke, in his book Cyber War (May 2010), defines "cyberwarfare" as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.
  • 19. A Look at the Most Common Cyber Crimes
  • 20. E- Mail Bombing  Similar to DoS  Purpose - Overloading of destination account  Can Shut-down a poorly-designed eMail system/ server  Can tie up the telecom channel for long periods  Defense: email filtering
  • 21. Email Spoofing  Using Forgery (illegal modifications) to Use Someone Else’s Account Name  Purpose:  Revenge  Financial Frauds  Defense:  Confirmation With the Sender
  • 22. Unauthorized Access  Sometimes Referred to as Hacking  Purpose:  Steal info  Plant malicious programs  Delete Files  Defense:  Intrusion detectors(An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a Management Station.)  Complex Passwords
  • 23. Credit Card Fraud  eCommerce server break-in  Using Stolen Credit Card No.s:  Online Shopping  Credit Card Auction  Defense:  Single-use credit card numbers  Single Transaction Credit Card Numbers
  • 24. Piracy  Using SW Without Author’s Permission  Using SW for Unauthorized Use  Defense: Authentication Techniques
  • 25. Industrial Espionage(Spying)  Spying over a Competitors Business  Monitors data coming in and out of your private network  Defense:  Private networks  Encryption  Network Sniffers (is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network)
  • 26. Web Store Spoofing  Fake Web stores  Customers’ Credit Card Info Obtained  Defense: Never Trust A Stranger
  • 27. Virus  Self-replicating SW (replicate itself and spread from one pc to another)  Elusive (difficult to describe)  Dependent(Executable-infecting viruses are dependent on users exchanging software or boot- able floppies, so they spread rapidly in computer hobbyist circles.)  Infects files on a computers through:  Storage Media  Networks
  • 28. Virus Classification  Malicious  May destroy or broadcast private data  May clog-up (obstructed) the communication channels  May tie-up the microprocessor to stop it from doing useful work  Harmless  e.g., funny prompts, annoying but cause no system crash
  • 29. Virus Anatomy(structure wise analysis)  Transmission Mechanism  Travel Through Hosts  Become Active when Host File Executed  Payload(The payload is what the computer virus is programmed to do. Some viruses do nothing more than copy themselves onto another PC, much like a real virus does from host to host. This is the simplest payload that a virus can have. However, just like viruses in nature, some computer viruses have a greater effect - maybe they steal files or data or allow someone else to take control over the PC while some will destroy some or all of the data on the computer.)  Contains Malicious Instructions  Infection propagation component  Actual destructive component
  • 30. Other Virus-Like Programs  Trojan Horses  Logic- and Time- Bombs  Worms
  • 31. Trojan Horses  Stand-alone programs  A Trojan horse, or Trojan, is a malicious application that appear as a legitimate file or helpful program but whose real purpose is, for example, to grant a hacker unauthorized access to a computer. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems  Types:  Password Trojans  Privileges- Elevating Trojans  Key Loggers  Destructive Trojans  Joke Programs  Back Orifice  NetBus
  • 32. Logic- or Time- Bombs  A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as a salary database in a company)  Execution Event Predetermined  Example events:  Command  Time
  • 33. Worms  Independent Programs  Harmless Instructions  Harmful duplication  Types:  Rabbits  Octopus
  • 34. World famous Worms & Viruses  1988 – the Internet Worm  1989 – the Span Network Worm  1997 – the Tree Christmas Worm  1998 – Chernobyl  1999 – Melissa, ExploreZip  2000 – “The Love Bug”  2000 – Pakistani Brain