Professional Documents
Culture Documents
Rubbia Khalid
(LCM-4073)
Presented to
Sir Umair
Aslam
WHY SYSTEMS ARE VULNERABLE
WORM :
• COPY THEMSELVES FROM COMPUTER TO COMPUTER THROUGH NETWORK
• DESTROY DATA AND HALT OPERATIONS OF COMPUTER NETWORK
• USUALLY COME THROUGH DOWNLOADED PROGRAMS, E-MAIL ATTACHMENTS
• MALWARE TARGET MOBILE DEVICES TOO, THUS BEING A SERIOUS THREAT TO
ENTERPRISE COMPUTING
TROJAN HORSE
• LOOKS LIKE A LEGITIMATE PROGRAM
• DOES NOT REPLICATE ITSELF, BUT CREATES WAY FOR VIRUS AND OTHER MALICIOUS
CODE
• BASED ON THE GREEK TROJAN WAR
SPYWARE
• SMALL PROGRAMS THAT TEMPORARILY INSTALL THEMSELVES ON THE COMPUTER TO
MONITOR WEB SURFING FOR ADVERTISING, BUT THEY ALSO ACT AS MALWARE,
AFFECTING THE COMPUTER PEFORMANCE
HACKING AND COMPUTER CRIME
HACKING :
• ACCESSING A COMPUTER SYSTEM UNAUTHORIZED
• USUALLY “CRACKER” IS AN INDIVIDUAL WITH CRIMINAL INTENT
• FIND WEAKNESSES IN THE SECURITY FEATURES OF WEB SITES OR COMPUTER
SYSTEMS
CYBER VANDALISM :
• INTENTIONAL DISRUPTION, DEFACEMENT OF WEB SITE OR CORPORATE INFORMATION
SPOOFING :
• HACKERS HIDE THEMSELVES BEHIND FAKE IDS
• ALSO INVOLVES REDIRECTING A WEB LINK TO A FAKE ONES THAT LOOKS LIKE THE
ORIGINAL SITE
SNIFFING :
• EAVESDROPPING PROGRAM THAT MONITORS
INFORMATION TRAVELING OVER A NETWORK
• THEY HAVE A LEGITIMATE USE AS WELL, BUT OTHERWISE
CAN BE VERY LETHAL
DOS ATTACK :
• HACKERS FLOOD A NETWORK SERVER OR WEB SERVER
WILL MANY REQUESTS FOR SERVICES TO CRASH THE
NETWORK
• FOR E-COMMERCE SITES, THESE ATTACKS CAN BE COSTLY
HACKING AND COMPUTER CRIME
COMPUTER CRIME
“ANY VIOLATIONS OF CRIMINAL LAW THAT INVOLVE A KNOWLEDGE OF COMPUTER
TECHNOLOGY FOR THEIR PERPETRATION, INVESTIGATION OR PROSECUTION”
IDENTITY THEFT
• CRIME IN WHICH AN IMPOSTER OBTAINS KEY PIECES OF KEY PERSONAL INFORMATION TO
IMPERSONATE SOMEONE ELSE, EG. CREDIT CARD THEFT
PHISHING
• SETTING UP FAKE WEB SITES OR SENDING FAKE E
• MAILS THAT LOOK LEGITIMATE TO ASK USERS FOR PERSONAL DATA
PHARMING
• REDIRECTS USERS TO FAKE WEB PAGE EVEN WHEN THEY HAVE ENTERED THE CORRECT WEB ADDRESS
• HAPPENS WHEN ISP COMPANIES HAVE FLAWED SOFTWARE
CYBERTERRORISM
• CYBER ATTACKS THAT TARGET SOFTWARE THAT RUN ELECTRIC POWER GRIDS, AIR TRAFFIC CONTROL,
OR BANK NETWORKS (ON LARGE SCALE)
CLICK FRAUD