Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Computer Crime and Viruses: Understanding the Risks and Protecting Your System - Prof. Ann, Exams of Introduction to Business Management

An overview of computer crime, including different types of malware such as viruses and worms, and the methods used to protect against them. It also covers various types of computer crime, from unauthorized access to intellectual property theft. Lectures, assignments, and an exam schedule for a university course on the topic.

Typology: Exams

Pre 2010

Uploaded on 08/18/2009

koofers-user-4i0
koofers-user-4i0 🇺🇸

5

(1)

10 documents

1 / 20

Toggle sidebar

Related documents


Partial preview of the text

Download Computer Crime and Viruses: Understanding the Risks and Protecting Your System - Prof. Ann and more Exams Introduction to Business Management in PDF only on Docsity! 10/30/2008 1 Where we are in the semester Topics Assignments Due Week 10 Oct 30 Computer Crime Lecture from 2, 3 of Excel 2007 Excel 2, 3 Amer 7 EW assignment due on Thursday Week 11 Nov 6 Lecture from 4 of Excel 2007 Lecture from 5 of Excel 2007 Excel 4 Excel 5 Week 12 Nov 13 Law and Ethics, Privacy and Security Amer 8, 9 Week 13 Nov 20 EXAM 3 (45 min.) covers Excel and Amer 7, 8, 9 Excel Assign. due by 5:00pm Friday. Week 14 Nov 27 THANKSGIVING HOLIDAY – NO CLASS MAKE UP EXAM (45 ) Week 15 Dec 4 - min. Review for the Optional Final Exam (Students must declare if they are going to take the Final) Week 16 Dec 11 Optional Final Exam covers PP, EW, Excel, Amer 1 - 9 1 Today’s agenda ITDS advisor visit Exam 2 results/corrections Lecture on computer crime Guest speaker – Alex Petit from Marsh corporation Excel – tutorials 2 and 3 10/30/2008 2 Welcome ITDS advisor Mr. Thomas McGinnis ITDS advisor Will talk to you about becoming BCIS major 3 Computer Viruses and Chapter 7 Computer Crime 10/30/2008 5 9 The Green Caterpillar virus is a prank Types of Viruses File viruses insert virus code into program files When the program is run, the virus spreads to any program that accesses the infected program Macro viruses use the macro language of an application to hide virus code When certain actions are taken in an infected document, the virus is activated Boot sector viruses replace the boot program used to start the computer system with an infected version Master boot record viruses store a copy of the master boot record d ff l h h b 10 in a i erent ocation so t at t e system cannot oot Multipartite viruses infect boot records and program files Very destructive and difficult to repair 10/30/2008 6 11 The Silly Willy file virus attempts to reformat a floppy disk 12 The Wallpaper macro virus attempts to replace the Windows Desktop with a picture of a skull on the 31st day of each month 10/30/2008 7 How Viruses Work Infection phase The virus replicates by attaching itself to a program file Th i l it lf t id d t tie v rus concea s se o avo e ec on Stealth viruses hide in fake code sections Polymorphic viruses change their code as they infect computers The virus watches for a triggering condition or event to release its payload Delivery phase The virus unleashes its payload Some viruses are logic bombs or time bombs A l i b b i ti t d h t i diti i d t t d 13 og c om s ac va e w en a cer a n con on s e ec e A time bomb is a type of logic bomb that is activated on a particular date 14 The Win32.Hatred file virus delivers its payload on the seventh of any month, displays a message, covers the screen with black dots, and deletes several antivirus files 10/30/2008 10 19 An e-mail describing a hoax 20 A list of hoaxes on the Symantec Web site 10/30/2008 11 21 Antivirus Software Protects a computer against viruses by identifying and removing any computer viruses I l d i i t i i filnc u es v ruses n memory, s orage, or ncom ng es Looks for virus signatures, which are known patterns of virus code Signature files should be updated regularly Inoculates existing program files Records key information about the file separately in order to detect a virus that has tampered with the file Removes or quarantines an infected file 22 Contains utilities to create a recovery disk in case of system failure 10/30/2008 12 23 24 Updating the signature files of an antivirus program 10/30/2008 15 29 Types of Computer Crime, cont. Intellectual property theft Occurs when someone steals someone else’s intellectual property (IP) IP f t i d i i l k h id i ti iti re ers o un que an or g na wor s suc as eas, nven ons, wr ngs, art, processes, company and product names, and logos Copyright infringement is one of the most common types of intellectual property theft Music and movie industries are aggressively suing both companies and individuals for copyright infringement Software theft Occurs when someone steals or illegally copies software 30 Software piracy is the unauthorized and illegal duplication of copyrighted software Most common type of software theft 10/30/2008 16 Methods of Committing Computer Crime Obtaining passwords By social engineering, e.g. tricking a user into giving away the password, shoulder surfing obtaining the password by watching the user type it in a public setting, using a packet sniffer to monitor network data, obtaining system administrator privileges Salami shaving Alters a program so that a very small amount of money is taken from a large number of transactions Data diddling Ill l h i d d l i 31 ega or unaut or ze ata a terat on Denial of service (DoS) attacks An assault on a single computer, with the intention of disrupting service on the entire system through that computer Distributed denial of service (DDoS) uses multiple computers to attack multiple computer networks 32 Choosing a good password 10/30/2008 17 Identifying Computer Criminals Cybercriminals are not an easily categorized group Hackers, typically males aged 19 to 35 with sophisticated computer knowledge Consider it exciting to beat the system Authorized users who commit unauthorized acts Angry, disgruntled, or dishonest employees Terrorists, cyberstalkers, and sexual predators The computer is a tool to help them commit their crime Spies 33 Steal security and military secrets or commit industrial espionage Prosecuting Computer Criminals Cybercriminals are difficult to locate Not confined by geography like traditional criminals Adept at covering their tracks by routing communications Because crimes can take place in many countries in a short span of time, international law enforcement officials must cooperate with each other Many computer crimes go unreported Companies are sometimes hesitant to pursue civil or criminal recourse Bad publicity and a long and costly legal process 34 Law enforcement officials are becoming trained in computer crime investigation Laws are being written to address computer crime directly
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved