Wednesday 14 January 2015

Computer Crimes seminar for MCA and CS ppt full dounload

Computer Crimes
When there is unauthorized access into a computer system in order to :Destroy data or programsCommit other offencesComputer crimes, sometimes referred to as cyber crime, is on the rise.  These crimes are most often carried out on the Internet.Software Piracy ( Illegal copy of software for the purpose of distribution or sale )Data ModificationDenial Of ServiceData CopyingVandalism & harassment (destruction / removal / modification of system)Unauthorized UseSoftware Piracy refers to illegal copying of software for the purpose of distribution or sale.Most common and widely spread form of computer crime, because most users prefer to use copies rather than spending money on buying software.Types of Internet Attacks
§Worm
§Trojan Horse
§Denial-of-Service Attacks
Computer Virus
That could make copies of itself or attach itself to other executable codes
Classification of Virus
    System Sector Virus :
Executes each time computer is started
May lead to destruction of all data
    File Virus :
    Infects executable program files, such as those with extensions like .BIN, .COM, .EXE, .DRV (driver) and .SYS. These programs are loaded in memory during execution, taking the virus with them. The virus becomes active in memory, making copies of itself and infecting files on disk.

    Macro Virus :

Since this virus attaches itself to documents, the 

  §Virus
A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs)
An executable code

•Infects the macros within a document or template.
•When word processing or spreadsheet document is opened, 
macro virus is activated and it infects the Normal template 
(Normal.dot) - a general purpose file that stores default 
document formatting settings. 
infection can spread if such documents are opened on other 
computers.

to download this FULL PPT click here

0 comments:

Post a Comment

2015