Вы находитесь на странице: 1из 14

Traps Online

and
Crimes Informatics
Awadh E. Ajeel
Structural Engineer and Instructor
Highway & Transportation Department
Engineering Faculty / Al-Mustansiriyah University
Speaker Qualifications

2/26/17 Traps online and Crimes Informatics Online 2


Introduction
Benefits, advantages and services of network and INTERNET are well
known in all wises of life and humanity. So, no need to explain these
avails.
The word INTERNET is an abbreviation of INTERconnected NETworks.
Where networks spread around the world.
Hidden users and anonymity represent the threats and the dark side
of internet.

2/26/17 Traps online and Crimes Informatics Online 3


The Core Rules of Netiquette
The word Netiquette is an abbreviation of Network etiquette. This term
refers to Good manners should apply to all Internet communication,
regardless of whether it is business or personal communication.
Netiquette rules can be remarked as in following:
Hidden users and anonymity represent the threats and the dark side of
internet.
Rule 1: Remember the Human
Rule 2: Adhere to the same standards of behavior online that you follow in real life
Rule 3: Know where you are in cyberspace
Rule 4: Respect other peoples time and bandwidth
Rule 5: Make yourself look good online
Rule 6: Share expert knowledge
Rule 7: Help keep flame wars under control
Rule 8: Respect other peoples privacy
Rule 9: Dont abuse your power
Rule 10: Be forgiving of other peoples mistakes

2/26/17 Traps online and Crimes Informatics Online 4


Online Unethical Behavior
Pranks can be funny if done in good taste but can so easily be hurtful
and should be avoided.
Jokes, Rumors and Libel, when one makes an untrue statement in
public that defames another persons character or reputation. The
person who has suffered libel can sue you for damages.
Flame War; do not start and do not listen or respond to any.
Downloading free shareware software you may use frequently.
Plagiarism; when you use information created by another person and
present it as if it were your own, either in whole or with a few words
changed randomly. This is considered a theft as it is considered
stealing intellectual property from someone else.

2/26/17 Traps online and Crimes Informatics Online 5


Online Criminal Activity
Sending threats to other people, making undue/unwanted advances,
sexual or otherwise.
Pretending to be someone else while working online as a way of
committing crimes.
Pretending to be a legitimate organization that takes money for
products and services never delivered.
Exchanging material like child pornography or a racial brochure.
Hosting Web sites that incite racial or religious hatred, or hatred
against minority groups, is illegal in most countries and therefore
constitutes a crime.
Hacking into another computer with the intent to destroy or cripple a
companys business.
Creating viruses and sending them to people with the intent to
destroy computers or information.

2/26/17 Traps online and Crimes Informatics Online 6


Viruses
A Virus is a computer program moves from computer to another by
attaching itself to other program files and would have a file extension like
.exe or .bat. In most cases, these viruses are not harmful to the
computer directly; however, others can be very destructive and destroy the
data on your computer.
Worms; that replicate themselves over the network without user
intervention. Worms make computer can no longer function or is shut down.
Trojans; Trojan horses are delivery vehicles for destructive code. A logic
bomb is hidden code in Trojan designed to run when some condition is met.
Zombies; in many cases, malware author aims to turn compromised system
into zombies. A collection of zombies sometimes called a botnet.
Rootkit; is software that grants full system control to the user. Viruses and
worms sometimes act as rootkit, granting the malware author full access to
the compromised system.
A hoax virus is a false virus warning stating dire consequences and you are
asked to forward the warning to all your friends and colleagues.

2/26/17 Traps online and Crimes Informatics Online 7


Hackers
A Hacker is someone who gets unauthorized access to another
computer (either physically or online), generally with the purpose of
looking around, stealing, or corrupting data.
Phishing; done by sending an e-mail that appears to be from a
trusted sender as credit card company, PayPal, Bank, NGO or eBay to
obtain the victim personal information.
Man in the Middle; the attacker positions himself hiddenly between
victims and listens (monitors) the session.
Spoofing; presenting credential that dont belong to you in order to
gain access to a system.
Social Engineering; another way of hacking by social attacks such as
Shoulder Surfing and Dumpster Diving.

2/26/17 Traps online and Crimes Informatics Online 8


2/26/17 Traps online and Crimes Informatics Online 9
Keep yourself Safe from Online Traps
and Crimes
Adopting a strong password policy and use the biometric if applicable to
protect your ID.
Establishing a safe working environment to avoid the social engineering
attacks.
Acceptable use of drilling down instead of surfing.
Due care with bookmarks or (favorites) instead of history.
Maintaining a virus free system. Buy original anti-virus and other software.
Training is needed to get qualification of how restricting access to
information or content, protecting your privacy, buy from webs or e-
commercials, using e-mail and social media etc.
Learning how to catch the hacker clues of phishing, man in the middle,
spoofing .. etc.
You must firstly check if you have a Secure Socket Layer (SSL) connection
before submit you ID or Credit Card information.
Keeping Up with Technology and Sharing Your Knowledge

2/26/17 Traps online and Crimes Informatics Online 10


Identifying Secure Sites

2/26/17 Traps online and Crimes Informatics Online 11


Internet Service Providers (ISP)
The portion sold to a user is your connection (onramp) to the
Internet that you pay for on a monthly basis.
The monthly fee usually includes other services such as:
o Maintenance of the connection lines.
o Maintenance of the hardware or software at the ISPs site.
o Customer support.
o Technical support.
o Protection against potential viruses or unauthorized access
requests.

2/26/17 Traps online and Crimes Informatics Online 12


Pay Attention
One should always keep the golden rule of Netiquette
and real life in mind: do unto others as you would have
them do unto you!
Law does not protect ignorants.

2/26/17 Traps online and Crimes Informatics Online 13


Thanks for
Interactivity

Вам также может понравиться