basic about cyber crime, computer crime
TRANSCRIPT
Cyber Crime
Group 8Trần Minh Dũng
What is Cybercrime?
• Cybercrime, or computer crime, is crime that involves computer and network
• The computer may be used as a tool, or it may be the target or both
• There are two common kind of Cybercrime:+ Targeting computer networks or devices, including
malware and denial-of-service (DoS) attacks+ Using computer networks as a tool to do other criminal
activities including cyberstalking, phishing and fraud or identity theft
General Information about Computer Virus
• Virus is a program, a block of executable code, which attach itself to, overwrite or replace another program in order to reproduce itself without a knowledge of PC user
• There are different type of virus which can infect difference parts of a system
Trojan
• Usually called as Trojan Horse• Usually masked so that it look interesting• Doing something else that the user think it would do, it could: – Destroy system– Stealing identity– Money theft, ransom– Spying, surveillance, stalking
• A kind of virus but it doesn’t reproduce
Worm
• Worm is a program can replicate it self. It usually spreads over network connections
• Does not need to attach it self to another program• Could cause ransom attack, data theft• Usually use to install backdoor on the host computer
Bacteria
• Also known as rabbit• It replicates it self until the CPU, Memory, Diskspace of the
host computer has been minimize so that the computer become unresponsive
• Could cause denial of service
Logic bomb
• A type of Trojan horse can be used to release virus or bacteria
• It only work at a specified date or condition
DoS basic
• DoS attack exhaust the victim’s resources, makes the victim, site or node to deny service to its customers, using a single host
• DDoS (Distribute DoS) is similar to DoS but using multiple host
How to do DDoS attack
• Need to build a network of computer to perform DDoS attack– Hack into hosts, install attack tools– Hosts running these attack tools are known as zombies– Many zombies together form are called an army– Building an army is automated by using Virus, Worm and Trojan
horse,…
• The hacker use handler(master) machines to specify type of attack and victim’s address
• Start the attack either by remotely activating or by set time ahead
• The slaves begin sending streams of attack packets to the victim
• After that, the users are denied services due to lack of resources
DDoS attack• There are mainly two kinds of DDoS attacks:– Typical DDoS attack:
DDoS attack– DRDoS attack:• Slaves send a stream of packets
with the victim’s address as the source IP address to other uninfected machines (reflectors)• Reflectors connect to the
victim and send greater volume of traffic because they believe the victim was asked for it
Phishing• Is an Internet scam where user is fooled to give valuable
information• There are many Phishing method:– Email and Spam– Web-based Delivery– Internet relay chat and Instant message– Trojan
Protect yourself in an online worldUsing a firewall– Firewall is a piece of software sits between computer and the
internet which allows certain types of data to crossScanning for malware– Use an anti-virus program to protect yourself, turn on the
real-time scan to minimize the damage to your computerStay up-to-date– Make sure that your OS and anti-virus program are up to date to
minimize the risk of being exploit
Thanks for listening!