ICT & Computer crimes
Types of Computer Crimes
Noteworthy Computer Hackers. Elk Cloner Fridrik Skulason
Dangerous Computer Viruses
Conficker(2009) Storm
Worm(2007) Sony BMG infected CD’s(2005)
A Hacker’s Mind Hackers
Motivational needs are split into 3 sections. * Credibility * Ideology * Money The Ultimate Motive for a hacker is Money They can modify, rebuild and do addons to a system software that is not meant to do the specific tasks.
• Once a hacker get’s into your System Operating, he can : *Gather Personal Information *Doing Fraud in you computer network • Hackers look at our computer software’s as Discovering Design Flaws and Exploit Implementation Bugs • Implementation of Bugs means hacker’s abuse or taking advantage of the Flaws of the system. • Discovering Design Flaws is a part where the hacker’s study the system flaws such as
A Hacker’s tool chest
Decompilersand Disassemblers (ie: IDA Pro)
App scanners (ie: Prefix & Prefast, AppVerifier)
Code coverage tools (ie: Ncover, CoverageMeter)
Buffer overflow kits
Shell codes (ie: Metasploit)
Rootkits
Fault injection tools (Fuzzers, Holodeck)
Kernel debuggers (ie: WinDbg)
User-mode debuggers (ie: SoftIce)
• All the above are applications software’s either created, or bought from shops and modified by the hackers.
The Process of Hacking Identify and Qualify the target Determine Transactions (Which input allow entry points) Apply attack paterns
Build an Exploit (Use tools or custom codes) Find Vulnerability Observe behavior (Repeat every 5 minutes)
Simple attack paterns Buffer Overflow Direct Access to Direct Access to URL Encoding
Executable Files Configuration Files
Hacker’s Attitude Freedom
thinker and voluntary mutual help A poem made just for hackers to believe and can repeat it without thinking.
Ways to Prevent Hacking Have a excellent Firewall Do not access inappropriate website. Do not give out IP address Have a good anti-spyware or anti-
virus program.
Spam (i.e Email Spam, IM Spam and Mobile Spam) These are the common type of spam in the 21th century.)
Origins of Spamming It
is widely believed the term spam is derived from the 1970 SPAM sketch of the BBC television comedy series "Monty Python's Flying Circus". There are 2 popular false etymologies(something like what A.K.A stands for). 3. SPAM – *hit Posing As Mail. 4. SPAM – Stupid Pointless Annoying Mail
History of Spam People
get clashed with the food (SPAM) and internet SPAM. SPAM food company has applied, saying to the side of their product, saying, “Please Do: Always put the trademark SPAM in all capital letters.”
Preventing Spam There
is no way you can prevent
Spam. To reduce Spam, do not give you email to malicious website.
FRAUD FRAUD
is the crime or offense of deliberately deceiving another in order to damage them – usually, to obtain property or services unjustly. Fraud can be accomplished through the aid of forged objects. In the criminal law of common law jurisdictions it may be called "theft by deception," "larceny by trick," "larceny by fraud and deception," or something similar.