Topic 6 Internet_and_Computer_Crimes - 1 omputer and...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 1 omputer and Internet Crime MIS345: Topic # 6 2 IT Security Incidents Year Number of Incidents Reported 2001 52,658 2000 21,756 1999 9,859 1998 3,734 1997 2,134 Source: CERT Web site at www.CERT.org/stats 3 z Internet Domain Survey 4 Increased Internet Security Incidents 1. Increasing complexity increases vulnerability. 2. Higher computer user error and access to information. 3. Expanding and changing environment introduces new risks. 4. Increased reliance on commercial software with known vulnerabilities. 5 ypes of Internet Attacks z Virus z Worm z Trojan Horse z Denial-of-Service Attacks 6 Virus z The term “computer virus ” is an umbrella term used for many types of malicious code. z A virus is usually a piece of programming code that causes some unexpected and usually undesirable event. z Most viruses deliver a “payload” or malicious act. 7 Virus z Viruses may execute and effect your computer in many different ways. z Replicate themselves z Reside in memory and infect other files z Modify and/or create new files z Most common viruses are “macro” viruses. These viruses use an application language such as VBScript to infect and replicate documents and templates. 8 Worm z A worm is a type of computer virus that adds its viral body to its target and requires that the user actively pass the infected file to another user. z Worms are also harmful and they differ from standard viruses in that they have the ability to “self-propagate” without human intervention. 9 Trojan Horse z A Trojan horse is a program that gets secretly installed on a computer, planting a harmful payload that can allow the hacker to do such things as steal passwords or spy on users by recording keystrokes and transmitting them to a third party. 10...
View Full Document

This note was uploaded on 02/23/2010 for the course ACCOUNTING MIS3145 taught by Professor Mrso during the Spring '10 term at King Fahd University of Petroleum & Minerals.

Page1 / 24

Topic 6 Internet_and_Computer_Crimes - 1 omputer and...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online