Computer
Crimes
•When there is unauthorized access into a
computer system in order to :–Destroy
data or programs–Commit
other offences•Computer crimes, sometimes referred to as
cyber crime, is on the rise. These
crimes are most often carried out on the Internet.•Software
Piracy ( Illegal copy of software for the purpose of distribution or sale )•Data
Modification•Denial
Of Service•Data
Copying•Vandalism
& harassment (destruction / removal / modification of system)•Unauthorized
Use•Software
Piracy refers to illegal copying of software for the purpose of distribution or
sale.•Most
common and widely spread form of computer crime, because most users prefer to
use copies rather than spending money on buying software.Types
of Internet Attacks
§Worm
§Trojan Horse
§Denial-of-Service Attacks
Computer Virus
•That could make copies of itself or attach itself to other executable codes
Classification of Virus
System Sector Virus :
•Executes each time computer is started
•May lead to destruction of all data
File Virus :
Infects executable program files, such as those with extensions like .BIN, .COM, .EXE, .DRV (driver) and .SYS. These programs are loaded in memory during execution, taking the virus with them. The virus becomes active in memory, making copies of itself and infecting files on disk.
Macro Virus :
•Since this virus attaches itself to documents, the
§Worm
§Trojan Horse
§Denial-of-Service Attacks
Computer Virus
•That could make copies of itself or attach itself to other executable codes
Classification of Virus
System Sector Virus :
•Executes each time computer is started
•May lead to destruction of all data
File Virus :
Infects executable program files, such as those with extensions like .BIN, .COM, .EXE, .DRV (driver) and .SYS. These programs are loaded in memory during execution, taking the virus with them. The virus becomes active in memory, making copies of itself and infecting files on disk.
Macro Virus :
•Since this virus attaches itself to documents, the
§Virus
A virus is a
small piece of software that piggybacks on real programs. For example, a virus
might attach itself to a program such as a spreadsheet program. Each time the
spreadsheet program runs, the virus runs, too, and it has the chance to
reproduce (by attaching to other programs)
•An
executable code
•Infects
the macros within a document or template.
•When
word processing or spreadsheet document is opened,
macro virus is activated and
it infects the Normal template
(Normal.dot) - a general purpose file that
stores default
document formatting settings.
infection can spread if such
documents are opened on other
computers.
0 comments:
Post a Comment