Basic about cyber crime, computer crime

Preview:

Citation preview

Cyber Crime

Group 8Trần Minh Dũng

What is Cybercrime?

• Cybercrime, or computer crime, is crime that involves computer and network

• The computer may be used as a tool, or it may be the target or both

• There are two common kind of Cybercrime:+ Targeting computer networks or devices, including

malware and denial-of-service (DoS) attacks+ Using computer networks as a tool to do other criminal

activities including cyberstalking, phishing and fraud or identity theft

General Information about Computer Virus

• Virus is a program, a block of executable code, which attach itself to, overwrite or replace another program in order to reproduce itself without a knowledge of PC user

• There are different type of virus which can infect difference parts of a system

Trojan

• Usually called as Trojan Horse• Usually masked so that it look interesting• Doing something else that the user think it would do, it could: – Destroy system– Stealing identity– Money theft, ransom– Spying, surveillance, stalking

• A kind of virus but it doesn’t reproduce

Worm

• Worm is a program can replicate it self. It usually spreads over network connections

• Does not need to attach it self to another program• Could cause ransom attack, data theft• Usually use to install backdoor on the host computer

Bacteria

• Also known as rabbit• It replicates it self until the CPU, Memory, Diskspace of the

host computer has been minimize so that the computer become unresponsive

• Could cause denial of service

Logic bomb

• A type of Trojan horse can be used to release virus or bacteria

• It only work at a specified date or condition

DoS basic

• DoS attack exhaust the victim’s resources, makes the victim, site or node to deny service to its customers, using a single host

• DDoS (Distribute DoS) is similar to DoS but using multiple host

How to do DDoS attack

• Need to build a network of computer to perform DDoS attack– Hack into hosts, install attack tools– Hosts running these attack tools are known as zombies– Many zombies together form are called an army– Building an army is automated by using Virus, Worm and Trojan

horse,…

• The hacker use handler(master) machines to specify type of attack and victim’s address

• Start the attack either by remotely activating or by set time ahead

• The slaves begin sending streams of attack packets to the victim

• After that, the users are denied services due to lack of resources

DDoS attack• There are mainly two kinds of DDoS attacks:– Typical DDoS attack:

DDoS attack– DRDoS attack:• Slaves send a stream of packets

with the victim’s address as the source IP address to other uninfected machines (reflectors)• Reflectors connect to the

victim and send greater volume of traffic because they believe the victim was asked for it

Phishing• Is an Internet scam where user is fooled to give valuable

information• There are many Phishing method:– Email and Spam– Web-based Delivery– Internet relay chat and Instant message– Trojan

Protect yourself in an online worldUsing a firewall– Firewall is a piece of software sits between computer and the

internet which allows certain types of data to crossScanning for malware– Use an anti-virus program to protect yourself, turn on the

real-time scan to minimize the damage to your computerStay up-to-date– Make sure that your OS and anti-virus program are up to date to

minimize the risk of being exploit

Thanks for listening!