Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Introduction To Cybercrime and Environmental Laws and Protection

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 33

INTRODUCTION TO

CYBERCRIME AND
ENVIRONMENTAL LAWS AND
PROTECTION
“ T Y PE S OF CO M P U T E R S A T T A CK S ”

Presented by :
ATTY. JIM PETERICK G. SISON, RCRIM.,J.D. MSCJ (IN-PROGRESS)
SEQUENCE OF PRESENTATION:

K. ADWARE
L. BOTNET
M. BRUTE FORCE ATTACK
N. FIREWALL
O. KEYSTROKE LOGGING
P. LOGIC BOMB
Q. MALWARE
R. PHREAKERS
S. SPYWARE
T. SQL INJECTION
U. ZOMBIE DRONE
IT IS A SHORTER TERM FOR
“ADVERTISEMENT-SUPPORTED SOFTWARE”
OR “ADVERTISING SOFTWARE”.

a. Spy Ware
b. Adware
c. Malware
d. None of these
ADWARE

What is ADWARE?
- “advertisement-supported software” or “advertising software”
- it is a type of malware used for various pop-up advertisements that show up on
your computer or mobile device.
HOW DO YOU GET ADWARE?

- it is commonly activated unknowingly when users are trying to install


legitimate applications or a free computer program that adware is bundled with.

- alternatively, there may be a vulnerability in your software or operating system


which hackers exploit to insert malware, including some types of adware, into
your system.
ADWARE

• ADWARE generates revenue for its developers by automatically generating


adverts on your screen, usually within a web browser.

1. Pay-per-click (PPC)
2. Pay-per-view (PPV)
3. Pay-per-install (PPI)
ADWARE

At the less harmful end of the spectrum, adware is simply a nuisance. At the more
harmful end, it can be a damaging malware threat to your cybersecurity.
EXAMPLES OF ADWARE

• Legitimate Adware
- allows you to consent to ads and software promos, offsetting developer costs so they
can offer their software for free.
- is created by all types of developers – including reputable ones.
• Potentially Unwanted Applications (PUAs)
- include any program you might not have chosen to install onto your device.
- This may be called Potentially Unwanted Programs (PUPs)
• PUA Adware can fall into a gray area, where the extent to which it is malicious
or illegal depends on the goals of the software and those who distribute it:
 Legal Deceptive Adware PUA
- may actively make it tricky to opt-out of installing harmless third-party software.

 Legal Abusive Adware PUA


- designed to bombard you with ads.

 Illegal Malicious Adware PUA


- profits from malicious third parties who want to distribute malicious software
like spyware, viruses, or other malware into devices.
BOTNET

- is derived from “robot network”


- Is a generic name given to any collection of compromised PCs controlled by an
attacker remotely “virtual robot army”
- is a large group of malware-infected internet-connected devices and computers
controlled by a single operator
- attackers use these compromised devices to launch large-scale attacks to
disrupt services, steal credentials and gain unauthorized access to critical
systems.
• Botnets are typically created by a specific attacker or small group of attackers
using one piece of malware to infect a large number of machines – although
there’s no minimum size for a group of PCs to be called botnet. The individual
PCs in botnet are generally called “bots” or “zombies”.
 Example of well-known botnets that have emerged in recent years include
Conficker, Waledac, Mariposa and Kelihos.
• Botnets first entered the public consciousness in early 2000, when a Canadian
teenager launched a series of distributed denial-of-service (DDoS) attacks against
several high-profile websites. The teen, using the handle Mafiaboy, targeted Yahoo,
ETrade, Dell, eBay, Amazon, and other sites over the course of several days,
flooding the sites with massive amounts of junk traffic until their servers crashed.
• Although Mafiaboy (whose real name is Michael Calce), didn’t use a botnet to
launch his attacks, security experts warned in the aftermath of the episode that
botnets — and the DDoS attacks they’re used for — posed a major threat to the
stability and integrity of the Internet. Those experts turned out to be right on the
money.
H O W B O T N E T S A R E M A D E: M ET H O D S O F
INFECTION

• Two main methods through which attackers infect PCs to make them part
of a botnet:
1. Drive-by downloads - Drive-by download infections require a few different
steps for the attacker, and they require the attacker to find a popular Web site
with an exploitable vulnerability.

2. Email - the attacker sends out a large batch of spam that includes either a
file such as a Word document or PDF with malicious code in it, or a link to a
site where the malicious code is hosted.
BRUTE FORCE ATTACK

• A brute force attack uses trial-and-error to guess login info, encryption keys, or
find a hidden web page. Hackers work through all possible combinations
hoping to guess correctly.
TYPES OF BRUTE FORCE ATTACKS

1. Simple Brute Force Attacks - hackers attempt to logically guess your credentials —
completely unassisted from software tools or other means
2. Dictionary Attacks - in a standard attack, a hacker chooses a target and runs possible
passwords against that username. These are known as dictionary attacks.
3. Hybrid Brute Force Attacks - these hackers blend outside means with their logical
guesses to attempt a break-in. A hybrid attack usually mixes dictionary and brute force
attacks.
4. Reverse Brute Force Attacks - reverses the attack strategy by starting with a known
password. Then hackers search millions of usernames until they find a match. Many of
these criminals start with leaked passwords that are available online from existing data
breaches.
5. Credential Stuffing - if a hacker has a username-password combo that works
for one website, they’ll try it in tons of others as well. Since users have been
known to reuse login info across many websites, they are the exclusive targets of
an attack like this.
FIREWALL

- is a computer network security system that restricts internet traffic in, out, or
within a private network.
- is a security device — computer hardware or software — that can help protect
your network by filtering traffic and blocking outsiders from gaining
unauthorized access to the private data on your computer.
WHAT DOES A FIREWALL DO?

• A firewall acts as a gatekeeper. It monitors attempts to gain access to your


operating system and blocks unwanted traffic or unrecognized sources.
• How does it do this?
• A firewall acts as a barrier or filter between your computer and another
network such as the internet. You could think of a firewall as a traffic
controller. It helps to protect your network and information by managing your
network traffic. This includes blocking unsolicited incoming network traffic
and validating access by assessing network traffic for anything malicious like
hackers and malware.
TYPES OF FIREWALLS

• There are software and hardware firewalls. Each format serves a different but
important purpose. A hardware firewall is physical, like a broadband router —
stored between your network and gateway. A software firewall is internal — a
program on your computer that works through port numbers and applications.
• There also are cloud-based firewalls, known as “Firewall as a Service” (FaaS).
One benefit of cloud-based firewalls is that they can grow with your
organization and, similar to hardware firewalls, do well with perimeter security.
KEYSTROKE LOGGING

• is an act of tracking and recording every keystroke entry made on a computer,


often without the permission or knowledge of the user.
LOGIC BOMB

- are a small piece of code that is contained by other programs.


- they are not technically malware; however, they might be malicious.
- there are various kinds of malware; common types include WORMS and
VIRUSES that can have a logic bomb in terms of their attack policy.
• In contrast to viruses and worms that have the potential to infect a system on
their own,…
• a LOGIC BOMB
• is secretly inserted into a software application, computer network, or operating
system by someone with inside knowledge of the system.
MALWARE

- is the collective name for a number of “malicious software” variants.


- this includes viruses, ransomware and spyware.
- typically consists of code developed by cyber attackers, designed to cause
extensive damage to data and systems or to gain unauthorized access to a
network.
- is typically delivered in the form of a link or file over email and requires the
user to click on the link or open the file to execute the malware.
Malware has actually been a threat to individuals and organizations since the
early 1970s when the Creeper virus first appeared.
• QUESTION:

• It is often regarded as the first virus that was created in 1971 by Bob
Thomas of BBN.

a. Rabbit Virus
b. I Love You Virus
c. Creeper Virus
• Since the appearance of Creeper Virus, other viruses have also been created
and the world has been under attack from hundreds of thousands of different
malware variants, all with the intent of causing the most disruption and damage
as possible.
PHREAKERS

• PHREAKERS ATTACK
- is a fraudulent manipulation of telephone signaling in order to make free phone
calls.

- Phreaking involved reverse engineering the specific tones used by phone


companies to route long distance calls. By emulating those tones, “phreaks”
could make free calls around the world.
• the people who broke into telephone systems were dubbed as “phreakers”.
SPYWARE

- is a kind of malicious software - “malware” – that is installed on a computing


device without the end user's knowledge and starts covertly monitoring your online
behavior without your knowledge or permission.
- it secretly gathers information about a person or organization and relays this data
to other parties.
- it invades the device, steals sensitive information and internet usage data, and
relays it to advertisers, data firms or external users.
- monitors and logs your computer usage and activity. It observes the users behavior
and finds vulnerabilities which allows the hacker to see data and other personal
information that you'd normally consider private or sensitive.
QUESTION:

What is the most common type of spyware?

a. Virus
b. Adware
c. Ransomware
TYPES OF SPYWARE

ADWARE
- is a common type of spyware mainly used by advertisers. When you go online, it records
your web surfing habits to gather information on the type of sites you search for. This
information is used to direct marketing pop-ups and spam email.

KEYBOARD LOGGER
- Keyboard logger spyware is a malicious program used by hackers. This program is designed
to steal personal information by logging the actual keystrokes you type on your computer.
When you enter a PIN, password, or credit card number the keyword logger records it for the
hacker. This information can be used to access systems and commit identity theft and fraud.
SQL INJECTION

- also known as SQLI

- is a common attack vector that uses malicious SQL code for backend database
manipulation to access information that was not intended to be displayed. This
information may include any number of items, including sensitive company
data, user lists or private customer details.
ZOMBIE DRONE

• What is a Zombie Drone?


• A Zombie Drone is defined as a hi-jacked computer that is being used
anonymously as a soldier or 'drone' for malicious activity (e.g., distribute
unwanted spam e-mails) by an unknown party.
• A zombie computer, or “drone,” is a computer that has been secretly
compromised by hacking tools which allow a third party to control the
computer and its resources remotely. When the zombie computer connects to
the Internet the remote hacker can clandestinely make contact with the
computer to mine data from it or use it for any number of purposes.
Communication between the hacker and the computer travels through back
channels of the targeted system, keeping these processes hidden from the
owner.

You might also like