Transcript: What is computer crime? Any crime in which computer related technology is encountered. The commission of illegal acts through the use of a computer or against a computer system. What are the features of computer crime? Intelligence---specific technique Concealment---hard to be detected Complexity---many criminal objects and subjects Huge loss, extensive influence, rapid expansion What is the classification of computer crime ? Business attacks Financial attacks Terrorist attacks Grudge attacks Fun attacks What are the solutions? Raise network moral awareness Strengthen security management system Improve legal system Punish network criminal activities severely Group 8 Review of Video Question 3 Computer Crime Question 1 Question 4 WU, Yutong ZHUO, Yeying HUANG, Jianing GUO, Renju Conclusion Question 2 Introduction
Transcript: -6 hour battery life -The reason I like the Razer Blade is because it has lots of ram for gamming and a good battery life for using the internet. -The reason why an engineer would need a pc like this is because it is extremely powerful to run all of their programs. -Battery life, 7-8 hours -Has 64-128-256-512 GBs of SSD. -750 Gbs of SSD Business Student -4th generation Intel i7 processor that is very powerful and helps with graphics and battery Computer powerpoint Conclusion -200 GBs of Skydrive space for one year. -7-8 hours of battery life Price: $1799 -13.3'' Display -Very powerful, 4-8 GBs of ram. -8 GBs of ram Microsoft Surface Pro 2 -128 Gbs of SSD -4 GBs of ram Art Student Microsoft Surface Pro 2 Alienware 17 Price: $899-$1799 -The reason an art student would need this ultrabook is because it is extremely portable and has a good amount of ram to run art programs such as Photoshop along with good battery and decent storage for an art student. Razer Blade Engineer student Samsung series 9 Price: $1800 - Type and Touch cover are magnetic keyboards that attach at the bottom for fast typing. -Has peripherals, one USB 3.0, one microsdhx up to 64 GBs of extra space. -Intel i7 Haswell processor -Comes with 8 GBs of ram, upgradable to 16 My own computer -The reason why for the surface pro 2 is because a business student can get the Microsoft Office suite preloaded on it. -Up to 32 GBs of ram. Price: $1299
Transcript: Computer Crime Hijacking Spoofing Salami shaving Trojan Horse Definition is software that appears to perform a desirable function for the user prior to run or install, but steals information or harms the system. Trojan horses may allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, a hacker may have access to the computer remotely and perform various operations, limited by user privileges on the target computer system and the design of the Trojan horse. Defacing Is an attack on a website that changes the visual appearance of the site. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own. A message is often left on the webpage stating his or her pseudonym and the output from "uname -a" and the "id" command along with "shout outs" to his or her friends. Sometimes, the Defacer makes fun of the system administrator for failing to maintain server security. Most times, the defacement is harmless, however, it can sometimes be used as a distraction to cover up more sinister actions such as uploading malware. A high-profile website defacement was carried out on the website of the company SCO Group following its assertion that Linux contained stolen code. The title of the page was changed from "Red Hat v. SCO" to "SCO vs World," with various satirical content following Piggybacking Piggybacking refers to the action of accessing the Internet wirelessly without consent or knowledge of the owner of the access This practice is increasingly common for the proliferation of Wi-Fi access to the Internet. Usually, these disclosures do not have the proper security, for this reason anyone can join them Mail Bombing Internet usage, an e-mail bomb is a form of net abuse consisting of sending huge volumes of e-mail to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial-of-service attack. There are two methods of perpetrating an e-mail bomb: mass mailing and list linking. Mass mailing consists of sending numerous duplicate mails to the same email address. List linking signing a particular email address up to several email list subscriptions. The victim then has to unsubscribe from these unwanted services manually. Denial of service atack What is a denial-of-service (DoS) attack? Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Symptoms and Manifestations The United States Computer Emergency Response Team defines symptoms of denial-of-service attacks to include: Unusually slow network performance (opening files or accessing web sites) Unavailability of a particular web site Inability to access any web site Dramatic increase in the number of spam emails received Methods of attack A DoS attack can be perpetrated in a number of ways. The five basic types of attack are: Consumption of computational resources, such as bandwidth, disk space, or processor time. Disruption of configuration information, such as routing information. Disruption of state information, such as unsolicited resetting of TCP sessions. Disruption of physical network components. Obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately. How do you avoid being part of the problem? Unfortunately, there are no effective ways to prevent being the victim of a DoS or DDoS attack, but there are steps you can take to reduce the likelihood that an attacker will use your computer to attack other computers: Install and maintain anti-virus software Install a firewall, and configure it to restrict traffic coming into and leaving your computer Follow good security practices for distributing your email address. Applying email filters may help you manage unwanted traffic. Software privacy Software piracy is the unauthorized use or distribution of software. There are several reasons not to use pirated or pirate software. It's illegal and there is liability on your part. It's risky. If the software is from an unauthorized source, you could be getting a program that is not fully functional. There won't be another version of the software if there is no revenue to put back into research and development. This revenue has made the product affordable to legitimate users. It isn't ethical. The following are the most common types of software piracy: End-user Piracy This occurs when users make additional copies of software without authorization. Unauthorized Resale Reseller piracy occurs when an unscrupulous reseller distributes multiple copies of a single software package to different customers. Internet piracy Pirate websites that make software available for free download or in exchange for uploaded
Transcript: COMPUTER CRIME What is Computer Crime? Computer crime, or cybercrime, refers to any crime that involves a computer and a network. CASES: One of the highest profiled banking computer crime occurred during a course of three years beginning in 1970. The chief teller at the Park Avenue branch of New York's Union Dime Savings Bank embezzled over $1.5 million from hundreds of accounts. A hacking group called the MOD (Masters of Deception), allegedly stole passwords and technical data from Pacific Bell, Nynex, and other telephone companies as well as several big credit agencies and two major universities. The damage caused was extensive, one company, Southwestern Bell suffered losses of $370,000 alone. Different kinds of Cybercrime Worms Spyware Trojans Adware Phishing Scams Computer Viruses Identity theft Why do people create these viruses: To distribute political message. To attack the products of specific companies. Some of them consider their creations to be works of art,and see as a creative hobby. Financial gain from identity theft PROTECTION: • Keep you passwords complicated and even think about changing them on a regular basis. • Don’t give out too much personal information on your social networking sites. Protect your children by installing antivirus software parental controls. • Always make sure that you factor in the cost of antivirus software when buying a new PC. • Keep it updated • Never give out your personal information to anyone online.
Transcript: My favorite college football team! Oregon Ducks Javes Lewis Number 2 in the Nation! Number 1 in the league! the Ducks made it to the championship! Auburn won by 3 points.:( The championship game was not their best game. :( I still think UO is the best college football team though!
Transcript: You can avoid being hacked by making secure passwords . Also by nor opening unusual emails that you may receive. The benefit to owning a Mac made by Apple id that they have a firewall that prevents hacking fairly well. But not every one can afford a Mac if you own a P.C be sure to put a virus protection eg Norton. How is hacking done? The three types of hackers in this world today are black hats grey hats and white hats. White guys are the good guys. Black guys are the bad guys. Grey hats are the guys that work on both side of the streets and can be bought or hired. Three Types Of Hackers Hacking is done by creating code which is can be easily interpreted. The object of many hackers is to take done computers or websites. Some virus may look legit but preform illegal actions. Then you have virus that obtain your web habits and use them against you. People can learn cod by simply watching a video in Youtube What Is Hacking Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems. Hacking can be a good thing but most of the time its a bad thing. Most hackers are trying to get your identification or your credit card numbers where they spend a lot of money and put you in debt or put your life at harm. Computer Crime -Mafiaboy’s real name is Michael Calce -He was just 15 years old when he committed computer crime -Took down big companies like CNN, Yahoo and EBay -He sent a denial of service attack against companies How Can Hacking be prevented ? Mafia Boy .
Transcript: Computer viruses Main points Threats Types Threats Major cyberattack in the world Cybercriminal countryды Malware (malicious code) Documented cases Cybercriminal country Cybercrime Types Denial-of-service attacks Cyber warfare Stasivskyj L.S. departure of the information technologies Major cyberattack in the world
Transcript: RECOMMEND Scenario Total=$1,139.96 Total=$1,379.98 Thank You Choice 2 Asus CM6870-US0145 Processior: Intel Core i7-3370 Memory: 32GB Hard Drive: 1TB SATA Price:$999.99 Dell XPS 8700-3751BLK Processor: Intel Core i7-4770 Memory:16GB Hard Drive: 2TB SATA Price: $1,189.99 MONITOR Dell S2340M 23'' LED Monitor Price: $189.99 Computer Powerpoint by: Harpreet and Manjinder Choice 1 We recommend to buy ASUS because it less expensive than Dell .ASUS has 32GB memory and Dell has only 16GB memory. A small business owner wants to upgrade his computer. MONITOR ASUS VS207D-P 19'' LED Monitor Price: $139.99
Description: Add some color to your quarterly business review with this vibrant business presentation template. The bold visuals in this business template will make your next QBR a memorable one.
Description: The sky’s the limit. Boost your new sales initiative into orbit with an engaging and compelling SKO presentation. This template features a effective sales kickoff theme that makes it easy to be engaging. Like all Prezi SKO templates, it’s fully customizable with your own information.
Description: Storytelling is at the heart of great service. Use this stunning, customizable business presentation template to highlight employees who do exceptional work or position your customers as the heroes of your business.
Description: Catch the eye and engage the imagination with this cool-looking Prezi proposal template. The bold, bright design and highly dynamic theme all but guarantee success for your next sales or marketing proposal. All Prezi presentation templates are easily customized.
Now you can make any subject more engaging and memorable