Vous êtes sur la page 1sur 34

CYBER CRIME

REPORT

GROUP MEMBER:
HANNAN SHAHID
HASEEB ALI
HAMZA ANWER
BILAL ASIF
UNKNOWN.....?
TABLE OF CONTENTS
1 Introduction..............................................(X)

1.1 what is cyber crime?........................(X)


1.2 History ..............................................(X)
1.3 types of cyber crime.........................(X)
2 Hacking......................................................(X)
2.1 Hacking is cyber crime?................(X)
2.2 types of hackers.............................(X)
3 information theft.....................................(X)
3.1 credit card number theft..................(X)
3.2 ATM spoofing....................................(X)
3.3 PIN capturing.....................................(X)
3.4 Database theft...................................(X)
3.5 Electronic cash...................................(X)
4 Emial bombing...........................................(X)

5 Cyber Terrorism..........................................(X)

6 Denial-of-services Attacks..........................(X)
6.1 denial-of services attack...................(X)
7 Trojan horse Attacks.................................(X)
7.1 Tojan horse Attack..........................(X)
7.2 pupose of Trojan attacks.................(X)

8 Salami Attacks............................................(X)
8.1 Salami attacks.....................................(X)
8.2 How to Avoid a Salami attack..........(X)

9 Computer Vandalism...................................(X)
9.1 Computer Vandalism...........................(X)
9.2 who are the computer vandals?.........(X)
9.3 Today's vandalism computer threats...(X)
9.4 protection against computer vandalism..(X)
10 Conclusion....................................................(X)
10.1 Conclusion............................................(X)
10.2 Recommendation................................(X)
SUMMARY
Executive Summary Cyberspace is one of the great legal frontiers of our time. From 2000 to 2005, the
Internet has expanded at an average rate of 160 percent and currently an estimated 938 million people
are “on the Net.”1 Individuals, groups, and states depend on cyberspace for an unprecedented level of
services. Maintaining the confidentiality, integrity, and availability of the networks and the data they
carry increases the trust individuals and groups place in their information infrastructures to take
advantage of those services. Increasing trust allows greater levels of traditionally non-electronic services
to be made available, and encourages stable development and innovation of new services. Only through
developing compatible standards and laws can such innovation continue to grow. How we shape
standards and legal norms of conduct on the Internet now will affect millions of people in the future.
The standards and laws created must include greater flexibility to account for exponential growth in
technology and innovations. The Council of Europe Convention on Cybercrime is a historic milestone in
the combat against cyber crime. Member States of the Council of Europe should complete the
ratification of the Council of Europe Convention on Cybercrime of 2001, and other States should
evaluate the advisability of implementing the principles of the Convention, and consider the possibility
of acceding to that Convention. Based on the Council of Europe Convention on Cybercrime and the
recommendations from G8, OAS, and APEC, we may reach our goal of a global legal framework against
cybercrime. In order to make a proposal for the ratification or acceding to the Council of Europe
Convention on Cybercrime, establishing a Cybercrime Expert Committee is recommended. An Expert
Committee commission may be split in two reports. The first report should consist of a proposal for the
necessary amendments in the penal code and the criminal procedural law only for the ratification or
acceding to the Convention. The second report should cover a broader approach with an overview of all
possible amendments in the domestic penal and procedural provisions needed in the information and
communication technology of computer systems and networks. The strategy for a Committee may
therefore be using declarations according to article 40, and reservations according to article 42,
whenever it is possible. The Convention uses technology-neutral language so that the offences may be
applied to both current and future technology. States may exclude petty or insignificant misconduct
from implementation of the offences. The offences must be committed intentionally for criminal liability
to apply. Intentionally may be understood as wilfully or knowingly, but it is left to national
interpretation. Only in certain offences additional specific intentional element applies, for instance on
computer-related fraud with the requirement of fraudulent or dishonest intent of procuring an
economic benefit. The offence must be committed without right. This may refer to conducts undertaken
without authority or conducts not covered by established legal defences, excuses, justifications or
relevant principles under domestic law. The offences are not intended to criminalize legitimate and
common activities inherent in the design of networks, or legitimate and common operating or
commercial practices.
CHAPTER 1
INTRODUCTION
1.1 What is cyber crime?
Cyber crime, or computer related crime, is crime that involves a
computer and a network. The computer may have been used in
the commission of a crime, or it may be the target.Debarati
Halder and K. Jaishankar define cybercrimes as: "Offences that
are committed against individuals or groups of individuals with
a criminal motive to intentionally harm the reputation of the
victim or cause physical or mental harm, or loss, to the victim
directly or indirectly, using modern telecommunication
networks such as Internet (networks including but not limited
to Chat rooms, emails, notice boards and groups) and mobile
phones (Bluetooth/SMS/MMS)".
Cybercrime may threaten a person or a nation's security and
financial health. Issues surrounding these types of crimes have
become high-profile, particularly those surrounding hacking,
copyright infringement, unwarranted mass-surveillance, and
child grooming. There are also problems of privacy when
confidential information is intercepted or disclosed, lawfully or
otherwise. Debarati Halder and K. Jaishankar further define
cybercrime from the perspective of gender and defined
'cybercrime against women' as "Crimes targeted against
women with a motive to intentionally harm the victim
psychologically and physically, using modern
telecommunication networks such as internet and mobile
phones". Internationally, both governmental and non-state
actors engage in cybercrimes, including espionage, financial
theft, and other cross-border crimes. Activity crossing
international borders and involving the interests of at least one
nation state is sometimes referred to as cyberwarfare

1.2 History
Cybercrime first started with hackers trying to break into
computer networks. Some did it just for the thrill of accessing
high-level security networks, but others sought to gain
sensitive, classified material. Eventually, criminals started to
infect computer systems with computer viruses, which led to
breakdowns on personal and business computers.
Computer viruses are forms of code or malware programs that
can copy themselves and damage or destroy data and systems.
When computer viruses are used on a large scale, like with
bank, government or hospital networks, these actions may be
categorized as cyberterrorism. Computer hackers also engage
in phishing scams, like asking for bank account numbers, and
credit card theft.

1.3 Types
• hacking
• information theft
• email bombing
• cyber terrorism
• computer vandalism
• denial-of-services attack
• trojan horses attack
• salami attack
(and many more types )

CHAPTER 2
HACKING
2.1 Hacking is cyber crime?

A cybercrime is most generally defined as any criminal act


when the perpetrator hacks or breaks into a computer or
computer network in order to illegally obtain sensitive
information or disseminate destructive computer software.
Internet fraud, identity theft, and credit card account theft
are examples of cyber crimes.
There are some cyber crimes that don’t involve hacking,
however many do. The very definition of hacking is
breaking onto a computer or computer network without
permission (illegally). Therefore it is most definitely a
crime.
However illegal computer hacking may be, there are
varying views on the subjects within the underground
community of computer hackers. There are several widely
acknowledged subgroups of computer hackers:
2.2 Types of Hackers.
White Hat
These hackers hack onto computers for noble reasons,
and often act as security specialist for corporations.
Black Hat
This brand of hacker is what most commonly think of when
they think of criminal computer hacking. They have
malicious intent to defraud, vandalize, or steal.
Grey Hat
As the name suggests, the legality of these hackers is
uncertain. While they aren’t normally thought to hack for
personal gain or have malicious intentions, the tight rope
they walk is what puts them in grey territory.
Script Kittie
This is a derogatory term for a novice who breaks into
computer systems by using pre-packaged automated tools
written by someone else. They usually have little to no
understanding of what they are doing. They are the
outcasts of the hacker community, and often referred to as
“skiddiots.”
Hactivist
A hacktivist uses their hacking skills for political activism.
Some of the acts include web site defacements, redirects,
denial-of-service, information theft, and web site parodies.
CHAPTER 3
INFORMATION THEFT
Information Theft
There have been a growing number of cases of information
theft over the past few years. While more and more electronic
security measures have been going up to protect people's
possessions and information, these new technologies have bugs
and design flaws that are opening up whole new worlds for the
technologically advanced criminal.
3.1 Credit card number theft
People are using credit cards for more and more of their
purchases as time goes on. This is opening up a larger and
larger arena for credit card fraud. Credit cards are
especially easy to use fraudulently, because they require no
extra identification number to use. All that a thief needs is
pure information-they don't need the card, but just the
number on the card. Recently, with people spending more
on purchases transacted over the internet, credit card fraud
is becoming easier. Now thieves never have to get within
5,000 miles of the people they are stealing from. All they
would need is a quick and dirty web site (which could be
hosted for free, and anonymously) advertising some
fictional product, and including a form for buying online.
Instantly the perpetrators would have a list of credit card
numbers linked with names and mailing addresses, ready to
use for anything they want.

3.2 ATM spoofing


These crooks have pulled some impressively intricate
heists. One group of criminals set up a complete fake ATM
machine inside a mall in Connecticut.. It looked and
worked just like a real one, except that after giving it your
card and typing in your pin, it would refuse you service
saying it was out of order. It then had a record of the card
and PIN numbers of all the people who tried to use the
machine. The thieves then used legitimate ATM machines
all over town to withdraw over $3,000 from these
accounts.["The Risks Digest Volume 14: Issue 60" 1]

3.3 PIN capturing


Another group of criminals scoured the area across the
street from a busy ATM, looking for the perfect spot to
hide a video camera aimed at the keys on the ATM
machine. They found such a spot and set up their camera.
After each successful PIN number identification that they
recorded, one of the group members would go check for a
discarded receipt at the ATM. If they found one, the group
had the card number and the PIN number.

3.4 Database theft


The previous criminal activities are all aimed at compiling
databases of information obtained fraudulently from people
one by one. This takes time, and these people only have
limited amounts of time before their operations will be
recognized and shut down. This limits the number of
people whose information these criminals can obtain. There
are, however, large databases of this kind of information
that have been built up slowly and legally by mild-
mannered, legitimate internet companies. For example,
BMG Music Service lets customers give their credit card
numbers when they sign up, so they don't need to bother
each time they make a purchase. There are thousands of
users of this service, many of whom likely use this feature.
Combine this with the fact that hundreds of computer
systems are hacked into every day, and we have a situation
where hackers could steal an industrial-sized database of
this kind of information, and run wild.

3.5 Electronic cash


We are already well on the way to a cash-free society.
People now use ATM cards, credit cards, and check-cards
for a large percentage of their purchasing. As we move
further from a paper-money society, to a purely electronic
economy, new types of crime will emerge. What types
exactly will depend on what new forms of security
tomorrow's criminals will need to break. Will people be
synthesizing voice authorizations? Or running replay
attacks on retinal scanners? Or even learning to imitate a
victim's typing style. All we can be sure of, is that criminals
of tomorrow, like those of last century and those of today,
will keep on innovating.

4 EMAIL BOMBING
5 CYBER TERRORISM
CHAPTER 6
DENIAL-OF-
SERVICES ATTACK

6.1 Denial-of-service Attack


In computing, a denial-of-service attack (DoS attack) is a cyber-attack where the
perpetrator seeks to make a machine or network resource unavailable to its
intended users by temporarily or indefinitely disrupting services of a host
connected to the Internet. Denial of service is typically accomplished by flooding
the targeted machine or resource with superfluous requests in an attempt to
overload systems and prevent some or all legitimate requests from being fulfilled.

In a distributed denial-of-service attack (DDoS attack), the incoming traffic


flooding the victim originates from many different sources. This effectively makes
it impossible to stop the attack simply by blocking a single source.

A DoS or DDoS attack is analogous to a group of people crowding the entry door
or gate to a shop or business, and not letting legitimate parties enter into the
shop or business, disrupting normal operations.

Criminal perpetrators of DoS attacks often target sites or services hosted on high-
profile web servers such as banks or credit card payment gateways. Revenge,
blackmail and activism can motivate these attacks.

A DoS attack can be done in a several ways. The basic types of DoS attack include:
1. Flooding the network to prevent legitimate network traffic

2. Disrupting the connections between two machines, thus preventing access to a


service

3. Preventing a particular individual from accessing a service.

4. Disrupting a service to a specific system or individual

5. Disrupting the state of information, such resetting of TCP sessions

Another variant of the DoS is the smurf attack. This involves emails with
automatic responses. If someone emails hundreds of email messages with a fake
return email address to hundreds of people in an organization with an
autoresponder on in their email, the initial sent messages can become thousands
sent to the fake email address. If that fake email address actually belongs to
someone, this can overwhelm that person's account.

DoS attacks can cause the following problems:

1. Ineffective services

2. Inaccessible services

3. Interruption of network traffic

4. Connection interference

Denial-of-service attacks are characterized by an explicit attempt by attackers to


prevent legitimate users of a service from using that service. In a distributed
denial-of-service (DDoS) attack, the incoming traffic flooding the victim originates
from many different sources – potentially hundreds of thousands or more. This
effectively makes it impossible to stop the attack simply by blocking a single IP
address; plus, it is very difficult to distinguish legitimate user traffic from attack
traffic when spread across so many points of origin. There are two general forms
of DoS attacks: those that crash services and those that flood services. The most
serious attacks are distributed.[6] Many attacks involve forging of IP sender
addresses (IP address spoofing) so that the location of the attacking machines
cannot easily be identified and so that the attack cannot be easily defeated using
ingress filtering.

Court testimony shows that the first demonstration of DoS attack was made by
Khan C. Smith in 1997 during a DEFCON event disrupting Internet access to the
Las Vegas Strip for over an hour and the release of sample code during the event
led to the online attack of Sprint, EarthLink, E-Trade, and other major
corporations in the year to follow.
CHAPTER 7
TROJAN HORSE ATTACKS
7.1 Trojan Horse Attacks
In computing, Trojan horse, or Trojan, is any malicious
computer program which is used to hack into a computer by
misleading users of its true intent. The term is derived from the
Ancient Greek story of the wooden horse that was used to help
Greek troops invade the city of Troy by stealth.
Trojans are generally spread by some form of social
engineering, for example where a user is duped into executing
an e-mail attachment disguised to be unsuspicious, (e.g., a
routine form to be filled in), or by drive-by download or from
spam links and fake pop up & Advertisement. Although their
payload can be anything, many modern forms act as a
backdoor, contacting a controller which can then have
unauthorized access to the affected computer.Trojans may
allow an attacker to access users' personal information such as
banking information, passwords, or personal identity (IP
address). Also, Ransomware attacks—which blocks access to
data or threatens to publish it until a ransom is paid—are
usually carried out using a Trojan.
Unlike computer viruses and worms, Trojans generally do not
attempt to inject themselves into other files or otherwise
propagate themselves.

7.2 Pupose of Trojan Attacks


If installed or run with elevated privileges a Trojan will generally
have unlimited access. What it does with this power depends
on the motives of the attacker.

1 Destructive
• Crashing the computer or device.
• Modification or deletion of files.
• Data corruption.
• Block any anti-virus program.
• Block any installation process.
• Formatting disks, destroying all contents.
• Spreading malware across the network.
• Spying on user activities and access sensitive information.
2. Use of resources or identity
• Use of the machine as part of a botnet (e.g. to perform
automated spamming or to distribute Denial-of-service
attacks)
• Using computer resources for mining cryptocurrencies
• Using the infected computer as proxy for illegal activities
and/or attacks on other computers.
• Infecting other connected devices on the network.
3. Money theft, ransom
• Electronic money theft
• Installing ransomware such as CryptoLocker
4. Data theft
• Data theft, including for industrial espionage
• User passwords or payment card information
• User personally identifiable information
• Trade secrets
Trojan horses in this way may require interaction with a
malicious controller (not necessarily distributing the Trojan
horse) to fulfill their purpose. It is possible for those involved
with Trojans to scan computers on a network to locate any with
a Trojan horse installed, which the hacker can then control.
Some Trojans take advantage of a security flaw in older
versions of Internet Explorer and Google Chrome to use the
host computer as an anonymizer proxy to effectively hide
Internet usage, enabling the controller to use the Internet for
illegal purposes while all potentially incriminating evidence
indicates the infected computer or its IP address. The host's
computer may or may not show the internet history of the sites
viewed using the computer as a proxy. The first generation of
anonymizer Trojan horses tended to leave their tracks in the
page view histories of the host computer. Later generations of
the Trojan horse tend to "cover" their tracks more efficiently.
Several versions of Sub7 have been widely circulated in the US
and Europe and became the most widely distributed examples
of this type of Trojan horse.
In German-speaking countries, spyware used or made by the
government is sometimes called govware. Govware is typically
a trojan horse software used to intercept communications from
the target computer. Some countries like Switzerland and
Germany have a legal framework governing the use of such
software. Examples of govware trojans include the Swiss
MiniPanzer and MegaPanzer and the German "state trojan"
nicknamed R2D2.
Due to the popularity of botnets among hackers and the
availability of advertising services that permit authors to violate
their users' privacy, Trojan horses are becoming more common.
According to a survey conducted by BitDefender from January
to June 2009, "Trojan-type malware is on the rise, accounting
for 83-percent of the global malware detected in the world."
Trojans have a relationship with worms, as they spread with the
help given by worms and travel across the internet with them.
BitDefender has stated that approximately 15% of computers
are members of a botnet, usually recruited by a Trojan
infection.

CHAPTER 8
SALAMI ATTACKS

8.1 Salami Attacks


A salami attack is when small attacks add up to one major
attack that can go undetected due to the nature of this type of
cyber crime. It also known as salami slicing/penny shaving
where the attacker uses an online database to seize the
information of customers, that is bank/credit card details,
deducting minuscule amounts from every account over a
period of time. These amounts naturally add up to large sums
of money that is unnoticeably taken from the collective
accounts. Most people do not report the deduction, often
letting it go because of the amount involved. This could be a
fraction of a cent, so as to avoid suspicion from the
unsuspecting customer states Raj B Lonsane.

The victims that take the fall for such acts are usually bank
holders, and websites that store account information like
PayPal. It can be quite scary to have amounts disappear in large
portions at once, making it a onetime incident for the company.
Raj B Lonsane states that the amount of money that is then lost
cannot be replaced by the company, leading them to take on
court battles without the money to replace what is lost.
Therefore for an insider to do this on a regular basis, he/she
deducts money slyly in small quantities without having the
customer in question, take notice.

8.2 How to Avoid a Salami Attack?


A company that protects personal account information of a
customer has to be on the lookout for individuals who wish to
put them in a compromising situation when it comes to
another’s funds. Raj B Lonsane states that it is important to
know how to tackle this from an angle that is highly
sophisticated.

a) Banks have to update their security so that the attacker


doesn’t familiarize himself/herself with the way the framework
is designed, before finally hacking into it states Raj B Lonsane.

b) Raj B Lonsane adds that banks should advise customers on


reporting any kind of money deduction that they aren’t aware
that they were a part of. Whether a small or big amount, banks
should encourage customers to come forward and openly tell
them that this could mean that an act of fraud could very well
be the scenario.

c) Most Important according to Raj B Lonsane is that Customers


should ideally not store information online when it comes to
bank details, but of course they can’t help the fact that banks
rely on a network that has all customers hooked onto a
common platform of transactions that require a database. The
safe thing to do is to make sure the bank/website is highly
trusted and hasn’t been a part of a slanderous past that
involved fraud in any way.

A salami attack can seem innocent at first, especially if people


do not keep track of their finances when it exits their accounts.
A lot of people aren’t aware of how money comes and goes,
with attackers taking the advantage for such indifference on
the part of customers. In the world of cyber criminals, these
acts are a way at the end of it all, to seize funds as a way of
going against the company for personal reasons, or for no
reason at all.

Raj B Lonsane states that a common case of a salami attack is


what is called the ‘collect the roundoff’ technique, where a
programmer tweaks the arithmetic code sequence, where the
calculation exceeds the customary two/three that is meant for
financial record keeping. It is like when the currency is in
dollars, the roundoff is made to the nearest penny half the
time, where it can be lesser the other times. If these fractions
are collected, they can then amount to quite a sum of money
that financial companies will not take notice of. Another major
cause found a programmer cutting off 20 to 30 cents per
account two or three times a year, where it went unnoticed by
account holders who didn’t pay much attention to small
amount deducted.

Salami attacking is a security issue that many places have had


to deal with given the malicious intent of those who break
through the security that these financial institutions have on
their databases. Raj B Lonsane states that Cyber crime amounts
to devastating and overseen attacks that plague the world we
live in. Security officials are battling it out on the Internet every
day to keep the attacks under control, without breaching it on a
national or worldwide scale.
CHAPTER 9
COMPUTER VANDALISM

9.1 Computer Vandalism


In everyday life, there are vandals that seem to enjoy destroying things –
even though it can be hard to understand how they derive any tangible
benefit from their acts of vandalism. Unfortunately, the same type of
behaviour is also present in cyberspace. There are malware creators that
devote time and effort to acts of computer vandalism that can damage your
computers and data, and affect the services that businesses deliver.

9.2 Who are the computer vandals?


In the early days of the development of malware, the majority of
computer viruses and Trojans were created by students and other
young programmers – plus some older, more experienced
programmers. Today, there are still four main types of computer
vandal:
• Skilled students… showing off!
• Inexperienced youths… assisted by the Internet
• Professional developers
• Researchers

9.3 Today’s vandalism computer threats


Although all of these groups are still developing computer viruses, there
has been a reduction in the number of new, ‘traditional’ types of computer
threats that are being released. There are several possible reasons why:
• New laws
In many countries, changes in legislation have resulted in the arrest of
computer virus writers. With widespread press coverage, these arrests
have probably deterred many youths from developing malicious code.
• Games
Network games have offered another way for young people to show their
skills and prowess. Today, many computer-literate youths are more likely to
become gamers – rather than malware creators.
• Complexity
In the 1990s, it was a lot easier to create computer viruses that targeted
Microsoft’s DOS operating system – when compared with the effort
required to target today’s more complex Windows operating system.

9.4 How to protect yourself against


Computer Vandalism?
Anti-malware software is vital in defending your computer, mobile devices
and data against computer vandalism, viruses, worms, Trojans and other
malware. Kaspersky Lab has anti-malware solutions that deliver world-
class protection for a wide range of computers and other devices, including:
• Windows PCs
• Linux computers
• Apple Macs
• Smartphones

CHAPTER 10
CONCLUSION
10.1

CONCLUSION
In my opinion, any sort of crime (online or offline) should never
be tolerated. The safety and well-being of citizens should be
safeguarded. Everyone deserves a right to live in a secure
environment, no matter in real-life or on the Internet.
After doing my research on this issue, I understand the motives
of cyber-criminals. To a certain extent, I see why some choose
to take their political/religious protests online:
• global reach of the Internet
• support is quickly gained
• online protests are sure to get attention
• protestors are less likely to get caught
However, I find cyber-crime more serious than real-life crime,
for the sole reason that it usually affects millions of web users
at once (as compared to perhaps one bank or store in a real-life
robbery).
When online business activities are disrupted, its leads to great
inconvenience for customers and companies.
With technology being such a big part of our lifestyles today,
cyber-crime has no place in it.
I fully support measures and plans to battle cyber-crime.
For instance, following cyber-attacks on Sony, the Federal
Bureau of Investigation has issued search warrants to arrest the
culprits. To me, it is a massive piece of news, because it
indicates a strengthening commitment against cyber-criminals:

10.2
Recommendations

I want to give you some recommendations to prevent damage


to your computer and personal information & data because
many crimes occurred in cyberspace now.
• Get the antivirus software, anti-spyware and firewall and
do them up to date
• Don’t reply to spam e-mails
• Don’t open unknown e-mails or attachments from
unknown person and company
• Don’t and never give passwords or private and personal
data to unknown e-mails or Web sites
• When requested to ‘permit’ or ‘reject’ a request access to
the Internet, select reject except you are sure about
security of the site
• Be careful while you are shopping online;
• Get a back up from your P.C information on disks or CDs
often
• Use difficult to guess passwords.
• Don’t go to access to your computers with strangers
• Disconnect from the Internet when you do not in use

Glossary

Glossary of Cybercrime Terms
• Cybercrime Dictionary
• back door -- a vulnerability intentionally left in the security of a computer system or its
software by its designers

• biometrics -- the use of a computer user's unique physical characteristics -- such as


fingerprints, voice, and retina -- to identify that user

• black hat -- a term used to describe a hacker who has the intention of causing damage or
stealing information

• bypass -- a flaw in a security device

• ciphertext -- data that has been encrypted

• Computer Emergency Response Team (CERT) -- an organization that collects and


distributes information about security breaches

• countermeasure -- any action or device that reduces a computer system's vulnerability

• cracker -- a term sometimes used to refer to a hacker who breaks into a system with the
intent of causing damage or stealing data

• cracking -- the process of trying to overcome a security measure

• cryptography -- protecting information or hiding its meaning by converting it into a secret


code before sending it out over a public network

• crypto keys -- the algorithms used to encrypt and decrypt messages

• cybercrime -- crime related to technology, computers, and the Internet

• decrypt -- the process of converting encrypted information back into normal, understandable
text

• denial of service (DoS) -- an attack that causes the targeted system to be unable to fulfill its
intended function

• digital signature -- an electronic equivalent of a signature

• domain name -- the textual name assigned to a host on the Internet

• dumpster diving -- looking through trash for access codes or other sensitive information

• email -- an application that allows the sending of messages between computer users via a
network

• encryption -- the process of protecting information or hiding its meaning by converting it into
a code
• firewall -- a device designed to enforce the boundary between two or more networks, limiting
access

• hacker -- a term sometimes used to describe a person who pursues knowledge of computer
and security systems for its own sake; sometimes used to describe a person who breaks into
computer systems for the purpose of stealing or destroying data

• hacking -- original term referred to learning programming languages and computer systems;
now associated with the process of bypassing the security systems on a computer system or
network

• high risk application -- a computer application that, when opened, can cause the user to
become vulnerable to a security breach

• hijacking -- the process of taking over a live connection between two users so that the
attacker can masquerade as one of the users

• host -- a computer system that resides on a network and can independently communicate
with other systems on the network

• Hypertext Markup Language (HTML) -- the language in which most webpages are written

• information security -- a system of procedures and policies designed to protect and control
information

• Internet -- a computer network that uses the Internet protocol family

• Internet Relay Chat (IRC) -- a large, multiple-user, live chat facility

• Internet service provider (ISP) -- any company that provides users with access to the
Internet

• intranet -- a private network used within a company or organization that is not connected to
the Internet

• intrusion detection -- techniques designed to detect breaches into a computer system or


network

• IP spoofing -- an attack where the attacker disguises himself or herself as another user by
means of a false IP network address

• keystroke monitoring -- the process of recording every character typed by a computer user
on a keyboard

• leapfrog attack -- using a password or user ID obtained in one attack to commit another
attack

• letterbomb -- an email containing live data intended to cause damage to the recipient's
computer

• malicious code -- any code that is intentionally included in software or hardware for an
unauthorized purpose
• one-time password -- a password that can be used only once, usually randomly generated
by special software

• packet -- a discrete block of data sent over a network

• packet sniffer -- a device or program that monitors the data traveling over a network by
inspecting discrete packets

• password -- a data string used to verify the identity of a user

• password sniffing -- the process of examining data traffic for the purpose of finding
passwords to use later in masquerading attacks

• pen register -- a device that records the telephone numbers of calls received by a particular
telephone

• phracker -- a person who combines phone phreaking with computer hacking

• phreaker -- a person who hacks telephone systems, usually for the purpose of making free
phone calls

• piggyback -- gaining unauthorized access to a computer system via another user's legitimate
connection

• piracy -- the act of illegally copying software, music, or movies that are copyright-protected

• Pretty Good Privacy (PGP) -- a freeware program designed to encrypt email

• probe -- an effort to gather information about a computer or its users for the purpose of
gaining unauthorized access later

• risk assessment -- the process of studying the vulnerabilities, threats to, and likelihood of
attacks on a computer system or network

• smart card -- an access card that contains encoded information used to identify the user

• sniffer -- a program designed to capture information across a computer network

• social engineering -- term often used to describe the techniques virus writers and hackers
utilize to trick computer users into revealing information or activating viruses

• spam -- unsolicited commercial email

• spoofing -- the process of disguising one computer user as another

• trap and trace device -- a device used to record the telephone numbers dialed by a specific
telephone

• Trojan horse -- an apparently innocuous program that contains code designed to


surreptitiously access information or computer systems without the user's knowledge

• virus -- a computer program designed to make copies of itself and spread itself from one
• war dialer -- software designed to detect dial-in access to computer systems

• warez -- slang for pirated software

• white hat -- a hacker whose intentions are not criminal or malicious

• wiretapping -- the interception of electronic communications in order to access information

• worm -- a computer program that copies itself across a network

Biography
Reference Page
• [And12] R. Anderson, C. Barton, R. Böhme, R. Clayton, M. J. G. van
Eeten, M. Levi, T. Moore, and S. Savage. Measuring the cost of
cybercrime. In 11th Workshop on the Economics of Information
Security (WEIS), Article 10, Berlin, Germany, Jun
2012. http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.
pdf.
• [Har12] P. H. Hartel and M. Junger. Teaching information security
students to "think thief". Technical Report TR-CTIT-12-19, CTIT,
University of Twente, Jul
2012. http://eprints.eemcs.utwente.nl/22066/.
• [Kum09] P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J.
Hong, M. Blair, and T. Pham. School of phish: a real-word evaluation
of anti-phishing training. In 5th Symp. on Usable Privacy and
Security (SOUPS), page Article 3, Mountain View, California, Jul
2009. ACM. http://dx.doi.org/10.1145/1572532.1572536.
• [New09] G. R. Newman. Cybercrime. In M. D. Krohn, A. J. Lizotte,
and G. Penly Hall, editors, Handbook on Crime and Deviance, pages
551-584. Springer, Nov 2009. http://dx.doi.org/10.1007/978-1-4419-
0245-0_25.

Vous aimerez peut-être aussi