Professional Documents
Culture Documents
Today, the world is more digitally connected than ever before. Criminals take advantage of this online
transformation to target weaknesses in online systems, networks and infrastructure. There is a massive
economic and social impact on governments, businesses and individuals worldwide. Cybercrimes know
no national borders.
The use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking
in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime,
especially through the Internet, has grown in importance as the computer has become central to
commerce, entertainment, and government.
Computer Unauthorised
Viruses Use at work
Computer
Piracy
Worms
Hacking
Hacking
The process of illegally gaining access to a computer Or network is known as hacking. It
involves some degree of privacy violations and also harms the computer-based properties (like
files, web pages, software, etc.). People who involve in the hacking process are known as
hackers. The main purpose of hackers is to alter the computer hardware and software to achieve
a goal which is different (often involving its unethical use) from that of the owner's actual
objects. To change or modify the old setting of a computer system without the permission of the
system owner is known as hacking. These change or modification might be the cause of drastic
damage in the computer systems or networks. Hackers, who have malicious intent, are referred
as crackers as in cracking" into computers.
1) Denial of Service: This is the most common prank in networking wherein too many requests
for information are hitting to the website's equipment. By doing this, an attacker can easily block
the system, slow down the system performance or sometimes crash the site.
2) Trojan Horse: It is a program which contains malicious code (that can exploits the some
software's known weakness) and is un-known to the users.
3) Sniffers: It is the program that secretly searches the individual s data packets over the
Internet. These data packets contain the password or some other secret contents. It captures either
passwords or the entire content of the website.
4) Malicious Applets: These are the small programs that harm the Computer's resources. These
programs are normally written in java programming language.
6) War Dialing: These programs dial a large number of telephone numbers randomly to search
a modem, in order to connect with internet.
Cyber Theft
Most of the computer crimes comprise of the theft of money by accessing the network using an
unauthorized way. They are "inside jobs” and make the fake changes in the computer databases
that track the important information of employees.
For example, the much publicized Citibank theft case of 11 million dollars in late 1994. Cyber
theft is the process of stealing important information with the use of computer or communication
system in electronic format.
For example, when hackers crack the bank's computer and transfer the money in their accounts.
So, this process of stolen money is known as cyber theft.
Unauthorized Use at Work
For doing a good business, organisations increase the use of IT in their day-to-day work. They
provide computers and Internet connection to their employees for doing their work efficiently.
This increases their productivity but also runs at the risk of its misuse by employees. It is not
necessary that the behaviour of insiders is malicious but sometimes they misuse the
organization's resources, without any intention of causing risk or harm to the organization. They
simply do it, to complete their job on time. For example, most of the organisations ban the use
of personal computing devices for business purpose, but still some employees use the personal
laptops, to carry office work at home in weekends for completing it on time.
Insiders or employees must be made aware of the threats, so that it might reduce the risk of
insider misuse. Accessing the computer systems and network in an unauthorized way is known
as time and resource theft.
Piracy
Piracy refers to the unauthorised and intentional copying, selling, distributing, acquiring or
transferring of entities software or any intellectual property that are not available in public
domain.
Computer Viruses
A computer virus is a small program that copies itself into a Computer and infects it without the
knowledge of the owner.
Types of Viruses
Today, various types of computer viruses are known. Some of them are as follows:
1) File Infecting Viruses: These viruses mainly affect the executable files like * .com, *.exe,
*.drv, and *.dll files. These viruses are activated by copying themselves into the other executable
files, each and every time when infected files are opened or used. These viruses can be easily
spread out in other systems via e-mails or through file transfer system. The examples of file
infecting viruses are CIH and Jerusalem.
2) Boot Sector Viruses: These viruses hide themselves in to the boot sector (either on the
bootable disk or hard drive) of the computer. This virus does not infect the files in hard disk, but
damage the hard disk itself. These viruses can be easily transferred through physical media like
floppy disk, which is uncommon computer device at present. The examples of boot sector
viruses are Elk Cloner, Brain and Stoned.
3) Macro Viruses: Macro viruses are application specific, i.e., they infect only some specific
application for which it was created such as Microsoft Word, Excel or PowerPoint. Once the user
opens the particular application, the virus copies itself rapidly to the templates of that
application. This implies that when new document is created with the application, document will
also be infected with the macro virus. These viruses are easily spread via e-mail attachments.
The examples of macro viruses are DMV, Nuclear and Word Concept.
4) Script Viruses: These are known as script viruses because they are written in the script
programming languages such as VBScript (Visual Basic Script) and JavaScript. This virus gets
activated whenever any infected *.vbs file is double clicked. The most popular example of script
virus is ILOVEYOU which overwrites the *.jpg and *.mp3 files.
5) Direct Action Virus – When a virus attaches itself directly to a .exe or .com file and enters
the device while its execution is called a Direct Action Virus. If it gets installed in the memory, it
keeps itself hidden. It is also known as Non-Resident Virus.
6) Resident Virus – A virus which saves itself in the memory of the computer and then infects
other files and programs when its originating program is no longer working. This virus can easily
infect other files because it is hidden in the memory and is hard to be removed from the system.
7) Multipartite Virus – A virus which can attack both, the boot sector and the executable files
of an already infected computer is called a multipartite virus. If a multipartite virus attacks your
system, you are at risk of cyber threat.
8) Overwrite Virus – One of the most harmful viruses, the overwrite virus can completely
remove the existing program and replace it with the malicious code by overwriting it. Gradually
it can completely replace the host’s programming code with the harmful code.
9) Polymorphic Virus – Spread through spam and infected websites, the polymorphic virus are
file infectors which are complex and are tough to detect. They create a modified or morphed
version of the existing program and infect the system and retain the original code.
How do you prevent computer viruses?
Here are some steps that can help you prevent a virus infection:
Install current antimalware software and keep the software and definitions up to date.
Disable auto run to prevent viruses from propagating to media connected to the system.
Don't click web links or open attachments in email from unknown senders.
Don't download files from the internet from unknown senders or untrustworthy sites.
COMPUTER WORMS
A computer worm is a type of harmful software that copy itself and spread from one computer
to another without requiring any user intervention. It’s like a sickness that can move through a
network of computers, searching for weaknesses to infect. Worms often spread through email
attachments that may seem safe, but they can actually cause a lot of trouble. Once a computer
is infected, the worm can send itself to the person’s contacts, using their email account. This
Computer worms are classified based on the way they are distributed in the systems. Some are
explained below.
1. Email Worms
The email box is used as a client by the worm. The mail has infected link or attachment
which once opened downloads the worm. This worm searches the email contacts of the
infected system and sends links so that those systems are also destroyed. These worms have
double extensions like mp4 or video extensions so that the user believes it to be media
extensions. These worms do not have a downloadable link but a short link to open the
same. The link is clicked and the worm is downloaded, it either deletes the data or modifies
the same and the network is destroyed. An example of an email worm is ILOVEYOU
2. Internet Worms
Internet is used as a medium to search other machines vulnerable and affect them. Those
systems where the antiviruses are not installed are affected easily with these worms. Once
the machines are located they are infected and the same process is started all over again in
those systems. This is used to check the recent updates and security measures if the system
hasn’t installed any. The worm spreads through the internet or local area network
connections.
a shared folder and destroys other files. When another system downloads file from the
same network, the worm locates that system as well and is replicated. And the process is
repeated for all the systems in the network. These worms are media or other extensions and
hence users can easily download the same thinking that they are an extension of the files. A
worm ‘Phatbot’ infected computers in 2004 through sharing files. This worm has stolen
personal information such as credit card details and destroyed many systems on an
unprecedented scale.
are sent to those contacts. Once the contact accepts the invitation and opens the message or
link, the system is infected. The worms have either links to open websites or attachments to
download. These worms are not as effective as other worms. Users can destroy these
5. IRC Worms
The application Internet Relay Chat was a messaging application that was a trend once.
IRC worms worked in the way email and Instant Message worms and destroyed the
Once you feel that your system has a worm, it is very important to run a security scan and
identify the same. Only the best antivirus software can help you with the same. The
2. Antivirus Software
Antivirus software is a program which is designed to prevent, detect, and remove viruses and
other malware attacks on the individual computer, networks, and IT systems. It also protects our
computers and networks from the variety of threats and viruses such as Trojan horses, worms,
keyloggers, browser hijackers, rootkits, spyware, botnets, adware, and ransomware. Most
antivirus program comes with an auto-update feature and enabling the system to check for new
viruses and threats regularly. It provides some additional services such as scanning emails to
ensure that they are free from malicious attachments and web links.
3. PKI Services
PKI stands for Public Key Infrastructure. This tool supports the distribution and identification of
public encryption keys. It enables users and computer systems to securely exchange data over the
internet and verify the identity of the other party. We can also exchange sensitive information
without PKI, but in that case, there would be no assurance of the authentication of the other
party.
5. Penetration Testing
Penetration testing, or pen-test, is an important way to evaluate our business's security systems
and security of an IT infrastructure by safely trying to exploit vulnerabilities. These
vulnerabilities exist in operating systems, services and application, improper configurations or
risky end-user behavior. In Penetration testing, cybersecurity professionals will use the same
techniques and processes utilized by criminal hackers to check for potential threats and areas of
weakness.
6. Staff Training
Staff training is not a 'cybersecurity tool' but ultimately, having knowledgeable employees who
understand the cybersecurity which is one of the strongest forms of defence against cyber-
attacks. Today's many training tools available that can educate company's staff about the best
cybersecurity practices. Every business can organize these training tools to educate their
employee who can understand their role in cybersecurity
“TYPES OF CYBER CRIME”