CHAPTER 5 (Lama)
CHAPTER 5 (Lama)
COMPUTER
NETWORK
AND SECURITY
1
OUTLINE
2
COMPUTER SECURITY
3
CYBERCRIME = COMPUTER
CRIME
4
CYBERCRIME
Cybercriminals - individual
who uses computers/ networks/
Internet to perpetrate crime
6
WHY LEARN ABOUT CYBER
CRIME ?
7
WHY LEARN ABOUT CYBER
CRIME ?
8
LIST OF TOP 20 COUNTRIES WITH THE
HIGHEST RATE OF CYBERCRIME IN 2011
(source: BusinessWeek/Symantec)
9
PROFILE OF
CYBERCRIMINALS
1. Disgruntled employees
2. Teenagers
3. Political Hactivist
4. Professional Hackers
5. Business Rival
6. Ex-Boy/Girl Friends
7. Divorced ex-Husband/Wife/Fiancee.. etc
10
WHO ARE THE VICTIMS??
1. Gullible/innocent/easy to fool
2. Desperados and greedy people
3. Unskilled & Inexperienced
4. Unlucky people
11
COMPUTER CRIMES ARE
VULNERABLE
BECAUSE ....
Anonymity Computer’s
storage capacity
13
HACKING
14
HACKING
15
PHISHING
Phishing is a way of
attempting to acquire
information such as
usernames, passwords
and credit card details by
masquerading as a
trustworthy entity in an
electronic
communication.
16
PHISHING
17
PORNOGRAPHY
18
VIRUS DISSEMINATION
A computer virus is a
computer program that can
replicate itself and spread from
one computer to another.
Can spread in exe code when
its host is taken to the target
computer
Spread through network or the
Internet, carried on a
removable medium - floppy
disk, CD, DVD, or USB drive
19
CREDIT CARD FRAUD
20
SOFTWARE PIRACY
22
SPOOFING
23
SPOOFING
24
IRC CRIME
25
CYBER STALKING
27
SALAMI ATTACK!!
29
AMAN SHAH OF HOCK HUA
BANK 1991
31
32
Source : KPMG Fraud and Forensic Auditing
33
Source : KPMG Fraud and Forensic Auditing
COMPUTER
PROTECTION
34
MALWARE
35
TYPES OF MALWARE
Adware
Botnet
Keylogger Spyware
Trojan Horse
Virus
Worm
36
VIRUS
38
WORM
Preventive measures:
1. You can save your PC from getting infected with proper
maintenance and some common sense!
2. Get an anti-virus and an anti-spyware from a trusted source and
keep them updated on a regular basis
3. Use strong passwords and keep them secret.
4. Never turn off your firewall.
5. Use pen-drives, external hard disks cautiously. Scan them before
opening a file.
6. Don’t open stuff you aren’t supposed to! 41
SPYWARE AND ADWARE
42
SPYWARE AND ADWARE
DIFFERENCES:
SPYWARE ADWARE
to capture certain information to expose user to targeted
such as user’s surfing habits, advertisements (pop up ads,
shopping routines, sometimes changing your home page,
even credit card information etc.)
for marketing or other
purposes
43
KEYLOGGER
44
PROTECT YOUR COMPUTER
Anti-
Anti- Anti-key- Anti-
hacker-
spyware loggers worms
tools
to block your
(to prevent to safeguard your
personal to hack away at
hijackers from passwords and
information from hacker tools that
accessing your PC other private stuff
being taken can exploit your
without your computer even
permission after they're gone
46
DISCUSS
CYBERCRIME: IS IT OUT OF
CONTROL?
Spam, phishing, viruses, malware and identity theft etc…
cyber criminals are getting more audacious. Can anything
be done?
47
Define these
terms
48