cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time...

14
Hyoer hrcnes" kelc`b df servche `tt`hjs"vcrus$wdrn `tt`hjs"trdi`ls `lk jeybdggers" clterlet tcne taeft

Upload: oureducationin

Post on 03-Apr-2018

214 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

7/28/2019 Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

http://slidepdf.com/reader/full/cyber-crimes-denial-of-service-attacksvirusworm-attackstrojans-and-keyloggers 1/14

Hyoer hrcnes" kelc`b df servche`tt`hjs"vcrus$wdrn `tt`hjs"trdi`ls `lk

jeybdggers" clterlet tcne taeft

Page 2: Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

7/28/2019 Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

http://slidepdf.com/reader/full/cyber-crimes-denial-of-service-attacksvirusworm-attackstrojans-and-keyloggers 2/14

Kelc`b df Xervche @tt`hj  Kelc`b df Xervche `tt`hjs !KDX `tt`hjs# clvdbve fbddkclg ` hdnputer 

wcta ndre requests ta`l ct h`l a`lkbe, [acs h`uses tae hdnputer !e,g, `

weo server# td hr`sa `lk resubts cl `utadrczek users oeclg ul`obe td

`hhess tae servche dfferek oy tae hdnputer,

@ldtaer v`rc`tcdl td ` typch`b kelc`b df servche `tt`hj cs jldwl `s `

Kcstrcoutek Kelc`b df Xervche !KKdX# `tt`hj waerecl tae perpetr`tdrs`re `ly `lk `re gedgr`pach`bby wckespre`k,

Cbbustr`tcdl 0

@ serces df kcstrcoutek kelc`b df servche `tt`hjs cl Feoru`ry ?===

hrcppbek n`ly pdpub`r weosctes clhbukclg y`add,hdn" `n`zdl,hdn

`lk hll,hdn

Page 3: Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

7/28/2019 Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

http://slidepdf.com/reader/full/cyber-crimes-denial-of-service-attacksvirusworm-attackstrojans-and-keyloggers 3/14

Cbbustr`tcdl ?

 @ serces df ndre ta`l 0?5 sep`r`te out hddrkcl`tek kelc`b df servche `tt`hjs act tae hyoer clfr`struhture df Estdlc` cl e`rby?==7,

[ae `tt`hjs were `pp`reltby hdllehtek wcta prdtests `g`clst taeEstdlc`l gdverlnelt's kehcscdl td rendve ` Xdvcet.er` w`r 

nendrc`b frdn tae h`pct`b hcty, Ct cs suspehtek ta`t tae `tt`hjs were h`rrcek dut oy _ussc`l

a`hjers, [ae `tt`hj b`stek sever`b k`ys,

Page 4: Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

7/28/2019 Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

http://slidepdf.com/reader/full/cyber-crimes-denial-of-service-attacksvirusworm-attackstrojans-and-keyloggers 4/14

Page 5: Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

7/28/2019 Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

http://slidepdf.com/reader/full/cyber-crimes-denial-of-service-attacksvirusworm-attackstrojans-and-keyloggers 5/14

Or`cl !cl cts fcrst clh`rl`tcdl wrcttel cl I`lu`ry 0316# cshdlsckerek td oe tae fcrst hdnputer vcrus fdr tae ]H, [ae vcrus cs`bsd jldwl `s B`adre" ]`jcst`lc" ]`jcst`lc Or`cl" Or`cl.@ `lkUCUH, [ae vcrus w`s wrcttel oy twd ordtaers" O`sct `lk @ni`kF`rddq @bvc" wad bcvek cl B`adre" ]`jcst`l, [ae ordtaers tdbk

[CNE n`g`zcle taey a`k wrcttel ct td prdteht taecr nekch`bsdftw`re frdn pcr`hy `lk w`s suppdsek td t`rget hdpyrcgatclfrclgers dlby,

[ae vcrus h`ne hdnpbete wcta tae ordtaers' `kkress `lk tareepadle lunoers" `lk ` ness`ge ta`t tdbk tae user ta`t taecr 

n`hacle w`s clfehtek `lk fdr cldhub`tcdl tae user sadubk h`bbtaen,

Wael tae ordtaers oeg`l td rehecve ` b`rge lunoer df padleh`bbs frdn pedpbe cl UX@" Orct`cl" `lk ebsewaere" ken`lkclgtaen td kcsclfeht taecr n`hacles" tae ordtaers were stullek `lk

trcek td expb`cl td tae dutr`gek h`bbers ta`t taecr ndtcv`tcdl a`kldt oeel n`bchcdus,

Page 6: Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

7/28/2019 Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

http://slidepdf.com/reader/full/cyber-crimes-denial-of-service-attacksvirusworm-attackstrojans-and-keyloggers 6/14

[aey elkek up a`vclg td get taecr padle bcles hut dff `lkregrettek ta`t taey a`k reve`bek taecr hdlt`ht ket`cbs cl tae fcrstpb`he, [ae ordtaers `re stcbb cl ouscless cl ]`jcst`l `s clterletservche prdvckers cl taecr hdnp`ly h`bbek Or`cl Bcnctek,

Cbbustr`tcdl 0

[ae VOXTBDVEBE[[E_ vcrus oetter jldwl `s tae Bdve Oug dr tae CBDVESDU vcrus# w`s repdrtekby wrcttel oy ` Fcbcpcldulkergr`ku`te, Cl N`y ?===" tacs ke`kby vcrus oeh`ne taewdrbk—s ndst prev`belt vcrus, Bdsses clhurrek kurclg tacs vcrus`tt`hj were peggek `t UX + 0= ocbbcdl,

Page 7: Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

7/28/2019 Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

http://slidepdf.com/reader/full/cyber-crimes-denial-of-service-attacksvirusworm-attackstrojans-and-keyloggers 7/14

VOXTBDVEBE[[E_ utcbczek tae `kkresses cl Nchrdsdft Dutbddj`lk e.n`cbek ctsebf td tadse `kkresses,

[ae e.n`cb" wacha w`s selt dut" a`k ‒CBDVESDU„ cl cts suoiehtbcle, [ae `tt`hanelt fcbe w`s l`nek BDVEBE[[E_. FD_.SDU,[Q[,vos„,

]edpbe w`ry df dpelclg e.n`cb `tt`hanelts were hdlquerek oytae suoieht bcle `lk tadse wad a`k sdne jldwbekge df vcruses"kck ldt ldtche tae tcly ,vos extelscdl `lk oebcevek tae fcbe td oe `text fcbe, [ae ness`ge cl tae e.n`cb w`s ‒jclkby haehj tae`tt`haek BDVEBE[[E_ hdnclg frdn ne„,

Page 8: Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

7/28/2019 Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

http://slidepdf.com/reader/full/cyber-crimes-denial-of-service-attacksvirusworm-attackstrojans-and-keyloggers 8/14

Cbbustr`tcdl ?

]rdo`oby tae wdrbk—s ndst f`ndus wdrn w`s taeClterlet wdrn bet bddse dl tae Clterlet oy _doertNdrrcs sdnetcne cl 0311, [ae Clterlet w`s" tael" stcbbcl cts kevebdpclg ye`rs `lk tacs wdrn" wacha `ffehtektadus`lks df hdnputers" `bndst ordugat cts

kevebdpnelt td ` hdnpbete a`bt, Ct tddj ` te`n df experts `bndst taree k`ys td get rck df tae wdrn `lkcl tae ne`ltcne n`ly df tae

hdnputers a`k td oe kcshdllehtek frdn tae letwdrj,

Cbbustr`tcdl 8

Cl ?==?" tae hre`tdr df tae Nebcss` hdnputer vcrusw`s hdlvchtek, [ae vcrus a`k spre`k cl 0333 `lkh`usek ndre ta`l +1= ncbbcdl cl

k`n`ge oy kcsruptclg persdl`b hdnputers" ouscless`lk gdverlnelt hdnputer letwdrjs,

Page 9: Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

7/28/2019 Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

http://slidepdf.com/reader/full/cyber-crimes-denial-of-service-attacksvirusworm-attackstrojans-and-keyloggers 9/14

Cbbustr`tcdl ;

Cl ?==6" ` UX hctczel w`s hdlvchtek fdr hdlspcr`hy tdclteltcdl`bby h`use k`n`ge td prdtehtek hdnputers `lk hdnncthdnputer fr`uk,

Oetweel ?==; `lk ?==5" ae hre`tek `lk dper`tek ` n`bchcdussdftw`re td hdlst`ltby sh`l fdr `lk clfeht lew hdnputers,

Ct k`n`gek aulkreks df UX Kep`rtnelt df Kefelhe hdnputerscl UX@" Gern`ly `lk Ct`by, [ae sdftw`re hdnprdncsek hdnputer systens `t ` Xe`ttbe adspct`b" clhbukclg p`tcelt systens" `lkk`n`gek ndre ta`l 0"=== hdnputers cl ` H`bcfdrlc` shaddbkcstrcht,

Page 10: Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

7/28/2019 Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

http://slidepdf.com/reader/full/cyber-crimes-denial-of-service-attacksvirusworm-attackstrojans-and-keyloggers 10/14

Cbbustr`tcdl 5

Bdgch odnos `re evelt kepelkelt prdgr`ns, [acs cnpbces ta`ttaese prdgr`ns `re hre`tek td kd sdnetaclg dlby wael ` hert`clevelt jldwl `s ` trcgger evelt# dhhurs, e,g, evel sdne vcrusesn`y oe ternek bdgch odnos oeh`use taey bce kdrn`lt `bb tardugatae ye`r `lk oehdne `htcve dlby dl ` p`rtchub`r k`te bcje tae

Haerldoyb vcrus#,

Page 11: Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

7/28/2019 Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

http://slidepdf.com/reader/full/cyber-crimes-denial-of-service-attacksvirusworm-attackstrojans-and-keyloggers 11/14

[rdi`ls `lk Jeybdggers   @ [rdi l" `s tacs prdgr`n cs `ptby h`bbek" cs `l

ul`utadrczek prdgr`n wacha fulhtcdls frdn clsckewa`t seens td oe `l `utadrczek prdgr`n" taereoyhdlhe`bclg wa`t ct cs `htu`bby kdclg,

Jeybdggers `re regub`rby usek were td bdg `bb taestrdjes ` vchtcn n`jes dl tae jeyod`rk, [acs`ssunes sclcster prdpdrtcdls" cf ` jey bdgger csclst`bbek dl ` hdnputer wacha cs regub`rby usek fdr 

dlbcle o`ljclg `lk dtaer fcl`lhc`b tr`ls`htcdls, Jey.bdggers `re ndst hdnndlby fdulk cl puobch hdnputerssuha `s tadse cl hyoer h`fes" adtebs eth,Ulsuspehtclg vchtcns `bsd elk up kdwlbd`kclgspyw`re wael taey hbchj dl ‒frcelkby„ dffers fdr free

sdftw`re,

Page 12: Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

7/28/2019 Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

http://slidepdf.com/reader/full/cyber-crimes-denial-of-service-attacksvirusworm-attackstrojans-and-keyloggers 12/14

Cbbustr`tcdl 0

 @ ydulg b`ky repdrter w`s wdrjclg dl `l `rtchbe `odutdlbcle reb`tcdlsacps, [ae `rtchbe fdhusek dl adwpedpbe h`l e`scby fclk frcelksacp `lk evel bdve dl taeClterlet, Kurclg tae hdurse df aer rese`rha sae n`ke

` bdt df dlbcle frcelks, Dle df taese “frcelks— n`l`gektd clfeht aer hdnputer wcta ` [rdi`l,

[acs ydulg b`ky st`yek cl ` sn`bb dle oekrddn`p`rtnelt `lk aer hdnputer w`s bdh`tek cl dle

hdrler df aer oekrddn, Uljldwl td aer" tae [rdi`lwdubk `htcv`te aer weo h`ner` `lk nchrdpadle evelwael tae Clterlet w`s swcthaek dff, @ ye`r b`ter saere`bczek ta`t aulkreks df aer pchtur es were pdstek dlpdrldgr`pach sctes

`rdulk tae wdrbk!

Page 13: Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

7/28/2019 Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

http://slidepdf.com/reader/full/cyber-crimes-denial-of-service-attacksvirusworm-attackstrojans-and-keyloggers 13/14

Cbbustr`tcdl ?

[ae letwdrj `knclcstr`tdr cl ` gbdo`b o`ljrehecvek ` oe`utcfubby p`hjek HK _DN hdlt`clclg‒sehurcty  upk`tes„ frdn tae hdnp`ly ta`tkevebdpek tae dper`tclg systen ta`t r`l acso`lj—s servers,

Ae clst`bbek tae ‒upk`tes„ wacha cl re`bcty w`s[rdi`lczek sdftw`re, 8 ye`rs b`ter" tae effehtswere stcbb oeclg febt cl tae o`lj—s systen!

Page 14: Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

7/28/2019 Cyber crimes, denial of service attacks,virus/worm attacks,trojans and keyloggers, internet time theft

http://slidepdf.com/reader/full/cyber-crimes-denial-of-service-attacksvirusworm-attackstrojans-and-keyloggers 14/14

Clterlet [cne [aeft  [acs hdlldtes tae us`ge oy `l ul`utadrczek

persdl df tae Clterlet adurs p`ck fdr oy `ldtaer persdl,

Cbbustr`tcdl

Cl N`y ?===" tae Kebac pdbche `rrestek `lelgcleer wad a`k

ncsusek tae bdgcl l`ne `lk p`sswdrk df `

hustdner wadse Clterlet hdllehtcdl ae a`k set up,

[ae h`se w`s fcbek ulker tae Clkc`l ]el`b Hdke`lk tae Clkc`l [ebegr`pa @ht,