Transcript
Page 1: Basic about cyber crime, computer crime

Cyber Crime

Group 8Trần Minh Dũng

Page 2: Basic about cyber crime, computer crime

What is Cybercrime?

• Cybercrime, or computer crime, is crime that involves computer and network

• The computer may be used as a tool, or it may be the target or both

Page 3: Basic about cyber crime, computer crime

• There are two common kind of Cybercrime:+ Targeting computer networks or devices, including

malware and denial-of-service (DoS) attacks+ Using computer networks as a tool to do other criminal

activities including cyberstalking, phishing and fraud or identity theft

Page 4: Basic about cyber crime, computer crime

General Information about Computer Virus

• Virus is a program, a block of executable code, which attach itself to, overwrite or replace another program in order to reproduce itself without a knowledge of PC user

• There are different type of virus which can infect difference parts of a system

Page 5: Basic about cyber crime, computer crime

Trojan

• Usually called as Trojan Horse• Usually masked so that it look interesting• Doing something else that the user think it would do, it could: – Destroy system– Stealing identity– Money theft, ransom– Spying, surveillance, stalking

• A kind of virus but it doesn’t reproduce

Page 6: Basic about cyber crime, computer crime
Page 7: Basic about cyber crime, computer crime

Worm

• Worm is a program can replicate it self. It usually spreads over network connections

• Does not need to attach it self to another program• Could cause ransom attack, data theft• Usually use to install backdoor on the host computer

Page 8: Basic about cyber crime, computer crime
Page 9: Basic about cyber crime, computer crime

Bacteria

• Also known as rabbit• It replicates it self until the CPU, Memory, Diskspace of the

host computer has been minimize so that the computer become unresponsive

• Could cause denial of service

Page 10: Basic about cyber crime, computer crime

Logic bomb

• A type of Trojan horse can be used to release virus or bacteria

• It only work at a specified date or condition

Page 11: Basic about cyber crime, computer crime

DoS basic

• DoS attack exhaust the victim’s resources, makes the victim, site or node to deny service to its customers, using a single host

• DDoS (Distribute DoS) is similar to DoS but using multiple host

Page 12: Basic about cyber crime, computer crime

How to do DDoS attack

• Need to build a network of computer to perform DDoS attack– Hack into hosts, install attack tools– Hosts running these attack tools are known as zombies– Many zombies together form are called an army– Building an army is automated by using Virus, Worm and Trojan

horse,…

Page 13: Basic about cyber crime, computer crime

• The hacker use handler(master) machines to specify type of attack and victim’s address

• Start the attack either by remotely activating or by set time ahead

• The slaves begin sending streams of attack packets to the victim

• After that, the users are denied services due to lack of resources

Page 14: Basic about cyber crime, computer crime

DDoS attack• There are mainly two kinds of DDoS attacks:– Typical DDoS attack:

Page 15: Basic about cyber crime, computer crime

DDoS attack– DRDoS attack:• Slaves send a stream of packets

with the victim’s address as the source IP address to other uninfected machines (reflectors)• Reflectors connect to the

victim and send greater volume of traffic because they believe the victim was asked for it

Page 16: Basic about cyber crime, computer crime
Page 17: Basic about cyber crime, computer crime

Phishing• Is an Internet scam where user is fooled to give valuable

information• There are many Phishing method:– Email and Spam– Web-based Delivery– Internet relay chat and Instant message– Trojan

Page 18: Basic about cyber crime, computer crime

Protect yourself in an online worldUsing a firewall– Firewall is a piece of software sits between computer and the

internet which allows certain types of data to crossScanning for malware– Use an anti-virus program to protect yourself, turn on the

real-time scan to minimize the damage to your computerStay up-to-date– Make sure that your OS and anti-virus program are up to date to

minimize the risk of being exploit

Page 19: Basic about cyber crime, computer crime

Thanks for listening!