Ict & Society (merv & Nazmi)

  • Uploaded by: mirzanazmi
  • 0
  • 0
  • December 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Ict & Society (merv & Nazmi) as PDF for free.

More details

  • Words: 522
  • Pages: 17
ICT & Computer crimes

Types of Computer Crimes

Noteworthy Computer Hackers. Elk Cloner Fridrik Skulason

Dangerous Computer Viruses

Conficker(2009) Storm

Worm(2007) Sony BMG infected CD’s(2005)

A Hacker’s Mind  Hackers

Motivational needs are split into 3 sections. * Credibility * Ideology * Money  The Ultimate Motive for a hacker is Money  They can modify, rebuild and do addons to a system software that is not meant to do the specific tasks.

• Once a hacker get’s into your System Operating, he can : *Gather Personal Information *Doing Fraud in you computer network • Hackers look at our computer software’s as Discovering Design Flaws and Exploit Implementation Bugs • Implementation of Bugs means hacker’s abuse or taking advantage of the Flaws of the system. • Discovering Design Flaws is a part where the hacker’s study the system flaws such as

A Hacker’s tool chest 

Decompilersand Disassemblers (ie: IDA Pro)



App scanners (ie: Prefix & Prefast, AppVerifier)



Code coverage tools (ie: Ncover, CoverageMeter)



Buffer overflow kits



Shell codes (ie: Metasploit)



Rootkits



Fault injection tools (Fuzzers, Holodeck)



Kernel debuggers (ie: WinDbg)



User-mode debuggers (ie: SoftIce)

• All the above are applications software’s either created, or bought from shops and modified by the hackers.

The Process of Hacking Identify and Qualify the target Determine Transactions (Which input allow entry points) Apply attack paterns

Build an Exploit (Use tools or custom codes) Find Vulnerability Observe behavior (Repeat every 5 minutes)

Simple attack paterns  Buffer Overflow  Direct Access to  Direct Access to  URL Encoding

Executable Files Configuration Files

Hacker’s Attitude  Freedom

thinker and voluntary mutual help  A poem made just for hackers to believe and can repeat it without thinking.

Ways to Prevent Hacking  Have a excellent Firewall  Do not access inappropriate website.  Do not give out IP address  Have a good anti-spyware or anti-

virus program.

Spam (i.e Email Spam, IM Spam and Mobile Spam)  These are the common type of spam in the 21th century.) 

Origins of Spamming  It

is widely believed the term spam is derived from the 1970 SPAM sketch of the BBC television comedy series "Monty Python's Flying Circus".  There are 2 popular false etymologies(something like what A.K.A stands for). 3. SPAM – *hit Posing As Mail. 4. SPAM – Stupid Pointless Annoying Mail

History of Spam  People

get clashed with the food (SPAM) and internet SPAM.  SPAM food company has applied, saying to the side of their product, saying, “Please Do: Always put the trademark SPAM in all capital letters.”

Preventing Spam  There

is no way you can prevent

Spam.  To reduce Spam, do not give you email to malicious website.

FRAUD  FRAUD

is the crime or offense of deliberately deceiving another in order to damage them – usually, to obtain property or services unjustly.  Fraud can be accomplished through the aid of forged objects. In the criminal law of common law jurisdictions it may be called "theft by deception," "larceny by trick," "larceny by fraud and deception," or something similar.

Related Documents

Amp
July 2020 26
Amp
May 2020 18
Amp
December 2019 37
Amp
November 2019 42
Ict Dalam P&p
June 2020 31

More Documents from "miss iza"