Professional Documents
Culture Documents
ETHICS
BY Mr. Tahir Maqsood
Define computer Crime
Cyber crime, or computer related crime, is crime that
involves a computer and a network. The computer may
have been used in the commission of a crime, or it may be
the target.
Alternatively referred to as cyber crime, e-crime, electronic
crime, or hi-tech crime. Computer crimes an act performed
by a knowledgeable computer user, sometimes referred to
as a hacker that illegally browses or steals a company's or
individual's private information. In some cases, this person
or group of individuals may be malicious and destroy or
otherwise corrupt the computer or data files.
Computer criminals
Convicted computer criminals are people who are caught
and convicted of computer crimes such as breaking
into computers or computer networks. Computer crime can be
broadly defined as criminal activity involving information
technology infrastructure, including illegal access
(unauthorized access), illegal interception (by technical means
of non-public transmissions of computer data to, from or
within a computer system), data interference (unauthorized
damaging, deletion, deterioration, alteration or suppression of
computer data), systems interference (interfering with the
functioning of a computer system by inputting, transmitting,
damaging, deleting, deteriorating, altering or suppressing
computer data), misuse of devices, forgery (or identity theft)
and electronic fraud
Types of attack
• Techno-crime:
A premeditated act against a system or systems with
the intent to copy, steal, corrupt or otherwise deface or
damage part of or the complete computer system
Techno-vandalism:
These acts of “brainless” defacement of websites
and/or other activities, such as copying files and
publicizing their contents publicly
Categorized in 3 groups:
• Type I: Cybercriminals- hungry for recognition
Hobby hackers
IT professionals
Politically motivated hackers
Terrorist organizations
Install anti-virus software on your computers. Many Internet service providers supply these with
your agreement. But if they don’t, invest in an anti-virus program to prevent malware attacks on
your system.
Install perimeter security solutions. There are three types of network perimeter
security:
1) Firewall – Prevents unauthorized Internet users from accessing your private network via the
Internet
2) Intrusion Detection System – Monitors and reports on threats to your network Intrusion
3) Prevention Program – Stops threats as well as reports on them
Use a spam filter. You can either install spam filtering
software on your computer or network server, buy a dedicated
appliance or outsource spam filtering to an online service
provider. The software option is typically more budget-
friendly, but online services may be more effective and more
suitable for higher volumes of emails.
Wikipedia
Kaspersky Lab
Kaspersky Security Bulletin (2013)
Security Magazine (2013)
Webroot
Sophos
Norton
ESET NOD 32
Securelist
Youtube