Академический Документы
Профессиональный Документы
Культура Документы
COMPUTER CRIME
ook S
BY
JAMES BEAUCAR
B
QUITOS
Malicious Program is intrusive program or software that is designed to damage and destroy computers and
computer systems. Malware is a contraction for “malicious software. Examples of common malware includes
viruses, worms, Trojan viruses, spyware, adware, and ransomware.
Worms
Worms are a malicious software that rapidly replicates and spreads to any device within the
network. Unlike viruses, worms do not need host programs to disseminate. A worm infects a device
via a downloaded file or a network connection before it multiplies and disperses at an exponential
rate.
Trojan virus
Trojan viruses are disguised as helpful software programs. But once the
user downloads it, the Trojan virus can gain access to sensitive data and then modify, block, or delete the data.
This can be extremely harmful to the performance of the device. Unlike normal viruses and worms, Trojan
viruses are not designed to self-replicate.
Spyware
Spyware is malicious software that runs secretly on a computer and reports back to a remote user. Rather than simply
disrupting a device’s operations, spyware targets sensitive information and can grant remote access to predators. Spyware is often
used to steal financial or personal information.
Adware
Adware is malicious software used to collect data
on your computer usage and provide appropriate advertisements
to you. While adware is not always dangerous, in some cases
adware can cause issues for your system. Adware can redirect
your browser to unsafe sites, and it can even contain Trojan
horses and spyware
Ransomware
Ransomware is malicious software that gains access to sensitive information within a system, encrypts that information so
that the user cannot access it, and then demands a financial payout for the data to be released. Ransomware is commonly part of a
phishing scam.
Fileless malware
Fileless malware is a type of memory-resident malware. As the term suggests, it is malware that operates from a victim’s
computer’s memory, not from files on the hard drive. Because there are no files to scan, it is harder to detect than traditional
malware.
A Denial of Service (DoS) causes computer systems to slow down or stop. It is an attack that is meant to shut down a
machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with
3. SYN flood
1. Teardrop Attacks
or IP Fragmentation Attacks 2. User Datagram Protocol
flooding
TCP is reliable connection. That means it
makes sure that the data sent by the
In this type of attack, the hacker sends a User Datagram Protocol (UDP) is an sender is completely received by the
specially crafted packet to the victim. In unreliable packet. This means the receiver. To start a communication
order4.toPing of death between the sender and receiver, TCP
transmit data across networks, sender of5.the
Exploits
data does not care if 6. Botnets
IP packets are broken down into smaller follows a three-way
the receiver has received it. In UDP
packets. This is called fragmentation. handshake. SYN denotes
flooding, many UDP packets are sent the synchronization packet
to the victim at random ports. and ACK stands for acknowledgment.
Lizard Squad.
These groups t arget enterprises. They will first send out an
extortion email, followed by an attack if the victim does not
pay the ransom.
Identity Theft is illegal assumption of a person’s identity for economic gain. Identity theft is primarily
used to perform financial transactions using accounts in your name. These can be making purchases using a credit
card nu mber or taking out a loan for a car. Less commonly, it is used to obtain medical insurance, file fraudulent
tax returns, impersonate another individual during an arrest, open phone or wireless services, or even attempt
blackmail.
ATM Cards
If your ATM card has been stolen or is compromised, get a new card, account number and password. Do not use your old password. When
creating a password, don’t use common numbers like the last four digits of your Social Security number or your birth date.
Passports
If you have a passport, notify the passport office in writing to be on the lookout for anyone ordering a new passport fraudulently.
Phone Service
If your long distance calling card has been stolen or you discover fraudulent charges on your bill, cancel the account and open a new one.
Provide a password, which must be used anytime the account is charged.
Harassing Someone
Using text messaging, instant messaging and email to harass, threaten or embarrass the target.
Engaging in “warning wars.” (Many Internet Service Providers and social media sites offer a way to
report a user who is saying something inappropriate. Kids use these report buttons as a way to get the
victim in trouble or kicked offline.)
Posting rumors, threats or embarrassing information on social networking sites such as
Facebook, Twitter, and Instagram.3
Participating in text wars or text attacks, which occur when bullies gang up on the victim and send
thousands of texts. These attacks not only cause emotional distress but create a large cell phone bill.
Impersonating Someone
Developing a screen name that is similar to the victim’s screen name and then posting rude or hurtful
remarks while pretending to be the victim.
Stealing the victim’s password and chatting with other people while pretending to be the victim. The
bully will say mean things that offend and anger the victim’s friends or acquaintances.
Changing the target’s online profile to include sexual, racist or other inappropriate things.
Setting up an account on a social networking site and posting as the victim while saying mean, hurtful
or offensive things online.4 Actual photos of the victim may be used to make the account look
authentic.
Posing as the victim and posting in chat rooms of known child molesters, hate groups or dating sites.
The bully may even provide the victim’s personal information encouraging those in the groups to
contact the victim.
Pretending to be someone else in order to lure an unsuspecting person into a fake relationship. This
type of activity is often called catfishing.
Using Photographs
Taking nude or degrading pictures of the victim in a locker room, a bathroom or dressing room
without his or her permission.
Threatening to share embarrassing photos as a way of controlling or blackmailing the victim.
Sending mass emails or text messages that include nude or degrading photos of the victim. This
behavior is often called “sexting,” and once the photos are sent, there is no way to control it. The
photos can be distributed to hundreds of people within just a few hours.
Posting nude pictures on photo sharing sites for anyone on the Internet to view and download.
Using photographs to shame someone online. One common tactic teens use is to engage in slut
shaming. This behavior involves shaming someone, usually a girl, for the way she dresses, acts or the
number of people she has dated.
Creating Websites, Blogs, Polls, and More
Developing a website with information that is humiliating, embarrassing or insulting for the victim.4
Spreading rumors, lies or gossip about the victim online through websites or blogs.
Posting the victim’s personal information and pictures on a website, which puts the victim in danger
of being contacted by predators.4
Creating a blog about the victim that is embarrassing, insulting or humiliating.
Using the information that was shared in confidence and making it public.
Conducting an Internet poll about the victim. Questions in the poll may vary including everything from who is ugly and who
smells to who is dumb and who is fat.
Posting rude, mean or insulting comments about the victim via the chat option of online gaming sites.
Sending viruses, spyware or hacking programs to the victim in order to spy on the victim or control his or her computer remotely.
Participating in Video Shaming
Using a camera phone to video and later share a bullying incident, which may include one or more kids slapping, hitting, kicking
or punching the victim.
Downloading a video of something humiliating and posting it to YouTube in order to allow a larger audience to view the incident.
Sharing a video via mass e-mail or text messaging to humiliate and embarrass the victim.
Creating an incident that causes another person to become upset or emotional and then record the incident. This type of activity is
often referred to as cyberbaiting. Teachers are a common target for cyberbaiting incidents.