02-06-2012, 03:59 PM
CYBER CRIME AND SECURITY
CyberScelus.ppt (Size: 727 KB / Downloads: 308)
Introduction
Criminal activities that take place in cyberspace (the Internet).
Cybercrime is a growing concern for both law enforcement officials and consumers as a result of the rapid expansion of the Internet into all forms of business and commerce.
Cybercrime can be directed toward persons, property, companies, or government authorities.
All aspects of the Internet are vulnerable to such activities, including the World Wide Web, e-mail, chat rooms, and newsgroups.
A survey in 2001 by the Computer Security Institute (CSI) in conjunction with the FBI
The most common types of cybercrime experienced by companies were virus infection, insider abuse of network resources, and unauthorized access by insiders.
The Less common were system penetration, denial of service (DoS), theft of proprietary information, sabotage, fraud, and eavesdropping.
Hackers
Hackers are a programmers.
They should have the knowledge of advanced technology of operating systems and programming languages.
They may know of holes within systems and the reasons for such holes.
They constantly seek further knowledge, freely share what they have discovered, and never, ever intentionally damage data.
Crackers
A Cracker is a person who breaks into or otherwise violates the system integrity of remote machines, with malicious intent.
Crackers can gain unauthorized access
They can destroy vital data
They can deny legitimate users service, or basically cause problems for their targets.
Crackers can easily be identified because their actions are malicious.
History of Cracking…
It started with telephone technology.
Originally, a handful of kids across the nation were cracking the telephone system.
This practice was referred to as phreaking.
Phreaking is now recognized as any act by which to circumvent the security of the telephone company.
Although, in reality, phreaking is more about learning how the telephone system works and then manipulating it.