Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Transcript of Computer Crime
Why is the internet broken?
The nickname given to Micheal Calce, a student from Montreal, Quebec. In February of the year 2000 he was able to launch a number of denial-of-service attacks at large cooperate websites, overloading their servers. Yahoo!, Amazon.com, Dell, eBay, and CNN were some of the sites crashed by this man, they became unusable for hours and some days. He was able to do this using only a couple of computers
A number of cyber-attacks that attacked sites of Estonian organizations such as the Estonian parliament, banks, newspapers and others. These attacks were done using various types of denial-of-service attacks using expensive rented "zombie" (botnet) computers to spam. It is the second largest instance of state-sponsored cyber warfare.
Estonian Cyber War
Didn't use a DDoS, but they did use botnets. Using mainly pirated versions of windows they were able to get users bank information and their computers. The United States, Western Europe, Hong Kong, India and Australia were all places the hackers infected. Raising the Credit Card limits they were able to steal over $500 million dollars from over 5 million people in about just 18 months. Most of the botnets have been shut down, but they could likely do this again because there are no known suspects.
There are many ways to prevent DDoS or DoS attacks. You can prevent your computer from getting turned into a botnet, getting your information stolen or lost. You just need to know how.
Then how do we fix it?
There are about 5 ways to stop a DDoS/DoS: Overscribing your Bandwidth, using Automated Mitigation, Blackholing data, using a Third Party Provider, or Hardening your system.
DDoS or DoS
Viruses, worms, trojan horses, ransomware, spyware, adware, scareware, are all different kinds of software used to steal a variety of things from documents or information to your computer. And there are two ways to prevent this from happening.
Lets say you get ransomware on your computer. You either pay or lose your files, if they're backed-up you won't lose it and you aren't supporting a hacker. Or you get a crucial part of system 32 corrupted and you
to do a White Reset on your computer (delete everything (even operating system) you will still have your data. Someone people use clouds, others use USBs, neither are perfect, but both are better than neither.
BACKUP YOUR DATA!
If large sites can be broken with a few computers, how does the web as whole stand against a company? or a country?
It only took a few people to take down government websites. Using simple methods such as a DDoS! What would happen if a larger more confident groups decided to do something.
and the other 81
There are still many other types of attacks, and huge attacks that haven't been mentioned
If it's broken,
The simplest of these is using Automated Mitigation. This is a program that would look at a sites traffic patterns. If it noticed a lot of data was being sent at the same time it would try to attract it so a computer go for it but not a person. So regular folk can still access the site
DDoS is many, DoS is one
1. Be smart. If your smart/safe enough on the internet you won't be tricked into downloading Malware or getting scammed, but sometimes it does that automatically.
2. Using a anti-virus software will make t so much easier to browse the internet safely. It will prevent the unauthorized downloading of Malicious code. Even browser protection programs can help show you if a site is trying to steal your information or not.
any highly skilled computer expert capable of breaking into computer systems and networks using bugs and exploits.
Some are good, some are bad, we're only looking at the bad ones.
The "Black hats" will use a variety of methods to steal your data. They may use malware to make "zombies" or do their work for them, and these can do some damage: SOBIG.F which is a Trojan worm crashed airlines and businesses, CODE RED a worm that took down many government websites, SLAMMER a worm that was able to crash 911, I LOVE YOU a Trojan that stole millions of passwords, and MYDOOM crashed email services. These are only the five biggest malwares of all time. They also use different methods such as a DDoS or DoS just to crash websites to make them more vulnerable to hacks. Some attack every point in a process such as when sending information do something it wouldn't expect so it cracks and they can start stealing data.
DDoS: Distributed DoS
DoS: Denial of Service