Introduction To Cybercrime and Environmental Laws & Protection
Introduction To Cybercrime and Environmental Laws & Protection
CYBERCRIME AND
ENVIRONMENTAL LAWS
& PROTECTION
CDIN 329
LEARNING OBJECTIVES
•
• this generation of computers used
transistors instead of vacuum
tubes which were more reliable.
• In 1951 , the Universal Automatic
Computer (UNIVAC 1).
• In 1953 the International Business
Machine (IBM) 650 and 700 series
Third generation: 1963 - present
• Hard Drive
• Floppy disk
• CD & DVD
• USB Flash drive
Computer Care
1.Computer
2.Crime
Cyber Threats: A Brief Timeline
1939 Alan Turing, the father of computer science, and
The Bombe Gordon Welchman invent a code breaking machine
called The Bombe to decipher German Enigma-
machine-encrypted secret messages during World War
II
1969
Computer engineers Ken Thompson and Dennis Ritchie
UNIX OS create the UNIX operating system, which later becomes
the backbone of computerized technical infrastructure.
1971 John Draper, a phone phreaker, uses a toy whistle
Cap'n Crunch from a cereal box to hack into the AT&T phone
system and make free long-distance calls. Drapers
earns the nickname Captain Crunch.
2013 Target is breached during the busiest shopping season of the year – Nov.
Target Breach 27 through Dec. 15. Illegal hackers gain access to about 40 million credit
card and debit card accounts by using stolen network credentials from a
third-party vendor to break into the retailer’s network.
2014 Cyber criminals steal account information from at least 500 million
Yahoo Breach Yahoo users. User information such as names, email addresses,
telephone numbers, passwords and security questions were at risk
during the breach, which was not disclosed until two years later in 2016.
2014 56 million credit cards are compromised when illegal intruders install
Home Depot custom-built malware on self-checkout registers at Home Depot.
Breach
2014 83 million JP Morgan Chase accounts are compromised after
JP Morgan Chase Breach hackers gain access to the network by using stolen employee
login credentials.
2015 Nearly 79 million Anthem accounts are compromised and the
Anthem Hack breach is traced back to a phishing campaign, which allowed
hackers to gain remote access after an Anthem user unknowingly
downloaded malicious software.
2017 WannaCry, a global ransomware attack, halts computer systems
WannaCry in more than 150 countries, affecting more than 300,000 people.
Hack
7. Cyber Stalking This involves following a person's movements across the Internet
by posting messages (sometimes threatening) on bulletin boards
frequented by the victim, entering chat-rooms frequented by the
victim, constantly bombarding the victim with emails etc.
10. Email Bombing This refers to sending a large number of emails to the victim
resulting in the victim's email account (in case of an individual) or
mail servers (in case of a company or an email service provider)
crashing.
11. Salami Attacks These attacks are often used in committing financial crime and are
based on the idea that an alteration, so Insignificant, would go
completely unnoticed in a single case. E.g. a bank employee inserts
a program, into the bank's servers, that deducts a small amount of
money (say 5 cents a month) from the account of every customer.
This unauthorized debt is likely to go unnoticed by an account
holder.
12. Denial of Service
(DNS) Attack This involves flooding a computer resource with more requests than it can
handle, causing the resource (e.g. a web server) to crash thereby denying
authorized users the service offered by the resource. Another variation to a
typical denial of service attack is known as a Distributed Denial of Service
(DDoS) attack wherein the perpetrators are many and are geographically
widespread. It is very difficult to control such attacks and is often used in acts
of civil disobedience.
13. Virus/worm Viruses are programs attach themselves to a computer or a file and then circulate
themselves to another files and to other computers on a network. They usually
affect the data on a computer either by altering or deleting. Worms, unlike viruses
do not need the host to attach themselves to. They merely make functional copies
of themselves and do this repeatedly till they eat up all the available space on a
computer’s memory.
14. Logic Bombs These are event dependent programs where programs kick into action only when
a certain event (known as trigger event) occurs.
15. Trojan Attacks An unauthorized program which functions from
inside what seems to be an authorized program,
thereby concealing what it is actually doing.
16. Web Jacking This occurs when someone forcefully takes control of
a website(by cracking the password and later
changing it).
1.Rejected Stalker
2.Resentful Stalker
3.Predatory Stalker
4.Intimacy Seeker
5.Incompetent
6.Erotomania and Morbidly Infatuated