Introduction To Cybercrime and Environmental Laws and Protection
Introduction To Cybercrime and Environmental Laws and Protection
Introduction To Cybercrime and Environmental Laws and Protection
CYBERCRIME AND
ENVIRONMENTAL LAWS AND
PROTECTION
“ T Y PE S OF CO M P U T E R S A T T A CK S ”
Presented by :
ATTY. JIM PETERICK G. SISON, RCRIM.,J.D. MSCJ (IN-PROGRESS)
SEQUENCE OF PRESENTATION:
K. ADWARE
L. BOTNET
M. BRUTE FORCE ATTACK
N. FIREWALL
O. KEYSTROKE LOGGING
P. LOGIC BOMB
Q. MALWARE
R. PHREAKERS
S. SPYWARE
T. SQL INJECTION
U. ZOMBIE DRONE
IT IS A SHORTER TERM FOR
“ADVERTISEMENT-SUPPORTED SOFTWARE”
OR “ADVERTISING SOFTWARE”.
a. Spy Ware
b. Adware
c. Malware
d. None of these
ADWARE
What is ADWARE?
- “advertisement-supported software” or “advertising software”
- it is a type of malware used for various pop-up advertisements that show up on
your computer or mobile device.
HOW DO YOU GET ADWARE?
1. Pay-per-click (PPC)
2. Pay-per-view (PPV)
3. Pay-per-install (PPI)
ADWARE
At the less harmful end of the spectrum, adware is simply a nuisance. At the more
harmful end, it can be a damaging malware threat to your cybersecurity.
EXAMPLES OF ADWARE
• Legitimate Adware
- allows you to consent to ads and software promos, offsetting developer costs so they
can offer their software for free.
- is created by all types of developers – including reputable ones.
• Potentially Unwanted Applications (PUAs)
- include any program you might not have chosen to install onto your device.
- This may be called Potentially Unwanted Programs (PUPs)
• PUA Adware can fall into a gray area, where the extent to which it is malicious
or illegal depends on the goals of the software and those who distribute it:
Legal Deceptive Adware PUA
- may actively make it tricky to opt-out of installing harmless third-party software.
• Two main methods through which attackers infect PCs to make them part
of a botnet:
1. Drive-by downloads - Drive-by download infections require a few different
steps for the attacker, and they require the attacker to find a popular Web site
with an exploitable vulnerability.
2. Email - the attacker sends out a large batch of spam that includes either a
file such as a Word document or PDF with malicious code in it, or a link to a
site where the malicious code is hosted.
BRUTE FORCE ATTACK
• A brute force attack uses trial-and-error to guess login info, encryption keys, or
find a hidden web page. Hackers work through all possible combinations
hoping to guess correctly.
TYPES OF BRUTE FORCE ATTACKS
1. Simple Brute Force Attacks - hackers attempt to logically guess your credentials —
completely unassisted from software tools or other means
2. Dictionary Attacks - in a standard attack, a hacker chooses a target and runs possible
passwords against that username. These are known as dictionary attacks.
3. Hybrid Brute Force Attacks - these hackers blend outside means with their logical
guesses to attempt a break-in. A hybrid attack usually mixes dictionary and brute force
attacks.
4. Reverse Brute Force Attacks - reverses the attack strategy by starting with a known
password. Then hackers search millions of usernames until they find a match. Many of
these criminals start with leaked passwords that are available online from existing data
breaches.
5. Credential Stuffing - if a hacker has a username-password combo that works
for one website, they’ll try it in tons of others as well. Since users have been
known to reuse login info across many websites, they are the exclusive targets of
an attack like this.
FIREWALL
- is a computer network security system that restricts internet traffic in, out, or
within a private network.
- is a security device — computer hardware or software — that can help protect
your network by filtering traffic and blocking outsiders from gaining
unauthorized access to the private data on your computer.
WHAT DOES A FIREWALL DO?
• There are software and hardware firewalls. Each format serves a different but
important purpose. A hardware firewall is physical, like a broadband router —
stored between your network and gateway. A software firewall is internal — a
program on your computer that works through port numbers and applications.
• There also are cloud-based firewalls, known as “Firewall as a Service” (FaaS).
One benefit of cloud-based firewalls is that they can grow with your
organization and, similar to hardware firewalls, do well with perimeter security.
KEYSTROKE LOGGING
• It is often regarded as the first virus that was created in 1971 by Bob
Thomas of BBN.
a. Rabbit Virus
b. I Love You Virus
c. Creeper Virus
• Since the appearance of Creeper Virus, other viruses have also been created
and the world has been under attack from hundreds of thousands of different
malware variants, all with the intent of causing the most disruption and damage
as possible.
PHREAKERS
• PHREAKERS ATTACK
- is a fraudulent manipulation of telephone signaling in order to make free phone
calls.
a. Virus
b. Adware
c. Ransomware
TYPES OF SPYWARE
ADWARE
- is a common type of spyware mainly used by advertisers. When you go online, it records
your web surfing habits to gather information on the type of sites you search for. This
information is used to direct marketing pop-ups and spam email.
KEYBOARD LOGGER
- Keyboard logger spyware is a malicious program used by hackers. This program is designed
to steal personal information by logging the actual keystrokes you type on your computer.
When you enter a PIN, password, or credit card number the keyword logger records it for the
hacker. This information can be used to access systems and commit identity theft and fraud.
SQL INJECTION
- is a common attack vector that uses malicious SQL code for backend database
manipulation to access information that was not intended to be displayed. This
information may include any number of items, including sensitive company
data, user lists or private customer details.
ZOMBIE DRONE