Sei sulla pagina 1di 11

MALWARE Adware Example

 is short for malicious software,  Fireball infected 250 million


 Meaning software that can be used to computers and devices in 2017,
compromise computer functions, steal data, hijacking browsers to change default
bypass access controls, or otherwise cause search engines and track web
harm to the host computer. activity. However, the malware had
 is a broad term that refers to a variety of the potential to become more than
malicious programs. This post will define a mere nuisance. Three-quarters of
several of the most common types of it was able to run code remotely and
malware; adware, bots, bugs, rootkits, download malicious files
spyware, Trojan horses, viruses, and worms. 
2. BOT
The most common type of malware
 are software programs created to
1. Adware automatically perform specific
 (short for advertising-supported operations. While some bots are
software) is a type of malware created for relatively harmless
that automatically delivers purposes (video gaming, internet
advertisements. auctions, online contests, etc), it is
 Common examples of adware becoming increasingly common to
include pop-up ads on websites see bots being used maliciously.
and advertisements that are Bots can be used in botnets
displayed by software. Often (collections of computers to be
time’s software and applications controlled by third parties) for DDoS
offer “free” versions that come attacks, as spambots that render
bundled with adware. advertisements on websites, as web
 Most adware is sponsored or spiders that scrape server data, and
authored by advertisers and for distributing malware disguised as
serves as a revenue generating popular search items on download
tool. While some adware is sites. Websites can guard against
solely designed to deliver bots with CAPTCHA tests that verify
advertisements, it is not users as human.
uncommon for adware to come 3. BUG
bundled with spyware that is  a bug is a flaw produces an
capable of tracking user activity undesired outcome. These flaws are
and stealing information. Due to usually the result of human error
the added capabilities of and typically exist in the source code
spyware, adware/spyware or compilers of a program. Minor
bundles are significantly more bugs only slightly affect a program’s
dangerous than adware on its behavior and as a result can go for
own. long periods of time before being
discovered. More significant bugs
can cause crashing or freezing.
Security bugs are the most severe detected by users or security
type of bugs and can allow attackers programs. Once a rootkit has been
to bypass user authentication, installed it is possible for the
override access privileges, or steal malicious party behind the rootkit to
data. Bugs can be prevented with remotely execute files, access/steal
developer education, quality information, modify system
control, and code analysis tools. configurations, alter software
4. Ransom ware (especially any security software
 is a form of malware that that could detect the rootkit), install
essentially holds a computer concealed malware, or control the
system captive while demanding a computer as part of a botnet.
ransom. The malware restricts user Rootkit prevention, detection, and
access to the computer either by removal can be difficult due to their
encrypting files on the hard drive or stealthy operation. A rootkit
locking down the system and continually hides its presence,
displaying messages that are typical security products are not
intended to force the user to pay effective in detecting and removing
the malware creator to remove the rootkits. As a result, rootkit
restrictions and regain access to detection relies on manual methods
their computer. Ransom ware such as monitoring computer
typically spreads like a normal behavior for irregular activity,
computer worm ending up on a signature scanning, and storage
computer via a downloaded file or dump analysis. Organizations and
through some other vulnerability in users can protect themselves from
a network service. rootkits by regularly patching
 Ransom ware Example: This year, vulnerabilities in software,
the city of Baltimore was hit by a applications, and operating systems,
type of ransom ware updating virus definitions, avoiding
named RobbinHood, which halted suspicious downloads, and
all city activities, including tax performing static analysis scans.
collection, property transfers, and 6. Spyware
government email for weeks. This  is a type of malware that functions
attack has cost the city more than by spying on user activity without
$18 million so far, and costs their knowledge. These spying
continue to accrue. The same type capabilities can include activity
of malware was used against the city monitoring, collecting keystrokes
of Atlanta in 2018, resulting in costs data harvesting (account
of $17 million. information, logins, financial data),
5. Rootkit and more. Spyware often has
 is a type of malicious software additional capabilities as well,
designed to remotely access or ranging from modifying security
control a computer without being settings of software or browsers to
interfering with network Homeland Security alert, which
connections. Spyware spreads by notes that Emotet has cost state,
exploiting software vulnerabilities, local, tribal and territorial
bundling itself with legitimate governments up to $1 million per
software, or in Trojans. incident to remediate.
 Spyware Example: DarkHotel, which 8. Virus
targeted business and government  is a form of malware that is capable
leaders using hotel WIFI, used of copying itself and spreading to
several types of malware in order to other computers. Viruses often
gain access to the systems belonging spread to other computers by
to specific powerful people. Once attaching themselves to various
that access was gained, the programs and executing code when
attackers installed key loggers to a user launches one of those
capture their targets passwords and infected programs. Viruses can also
other sensitive information. spread through script files,
7. Trojan horse documents, and cross-site scripting
 commonly known as a “Trojan,” is a vulnerabilities in web apps. Viruses
type of malware that disguises itself can be used to steal information,
as a normal file or program to trick harm host computers and networks,
users into downloading and create botnets, steal money, render
installing malware. A Trojan can advertisements, and more.
give a malicious party remote access 9. Computer worms
to an infected computer. Once an  are among the most common types
attacker has access to an infected of malware. They spread over
computer, it is possible for the computer networks by exploiting
attacker to steal data (logins, operating system vulnerabilities.
financial data, and even electronic Worms typically cause harm to their
money), install more malware, host networks by consuming
modify files, monitor user activity bandwidth and overloading web
(screen watching, keylogging, etc), servers. Computer worms can also
use the computer in botnets, and contain “payloads” that damage
anonymize internet activity by the host computers. Payloads are pieces
attacker. of code written to perform actions
 Trojan Example: Emotet is a on affected computers beyond
sophisticated banking Trojan that simply spreading the worm.
has been around since 2014. It is Payloads are commonly designed to
hard to fight Emotet because it steal data, delete files, or create
evades signature-based detection, is botnets. Computer worms can be
persistent, and includes spreader classified as a type of computer
modules that help it propagate. The virus, but there are several
trojan is so widespread that it is the characteristics that distinguish
subject of a US Department of computer worms from regular
viruses. A major difference is that receives a strange email from you that you
computer worms have the ability to did not send)
self-replicate and spread
Malware Prevention and Removal
independently while viruses rely on
human activity to spread (running a  Install and run anti-malware and firewall
program, opening a file, etc). Worms software. When selecting software, choose
often spread by sending mass emails a program that offers tools for detecting,
with infected attachments to users’ quarantining, and removing multiple types
contacts. of malware. At the minimum, anti-malware
 Worm Example: Stuxnet was software should protect against viruses,
probably developed by the US and spyware, adware, Trojans, and worms. The
Israeli intelligence forces with the combination of anti-malware software and
intent of setting back Iran’s nuclear a firewall will ensure that all incoming and
program. It was introduced into existing data gets scanned for malware and
Iran’s environment through a flash that malware can be safely removed once
drive. Because the environment was detected.
air-gapped, its creators never  Keep software and operating systems up to
thought Stuxnet would escape its date with current vulnerability patches.
target’s network — but it did. Once These patches are often released to patch
in the wild, Stuxnet spread bugs or other security flaws that could be
aggressively but did little damage, exploited by attackers.
since its only function was to  Be vigilant when downloading files,
interfere with industrial controllers programs, attachments, etc. Downloads
that managed the uranium that seem strange or are from an unfamiliar
enrichment process. source often contain malware.
Malware Symptoms Comodo- The best way to remove malware and to
stay protected from future attacks are by
1. Increased CPU usage
downloading Antivirus Software from Comodo. It
2. Slow computer or web browser speeds
features a proactive mechanism that defends
3. Problems connecting to networks
against any kind of malware attack. The Comodo
4. Freezing or crashing
Antivirus Software provides does automatic
5. Modified or deleted files
scanning of files when downloaded from the
6. Appearance of strange files, programs, or
internet. On the whole, the Comodo’s antivirus
desktop icons
program protects against any malicious software
7. Programs running, turning off, or
including zero-day malware.
reconfiguring themselves (malware will
often reconfigure or turn off antivirus and Different Cyber Intruder
firewall programs)
8. Strange computer behavior 1. Trolls
9. Emails/messages being sent automatically 2. Hackers
and without user’s knowledge (a friend 3. Spies
4. Hackers
LECTURE COMP 1: SECURITY ISSUES AND THREATS COMPUTER CRIMES

SECURITY ISSUES: THREATS TO COMPUTERS &  Computer crimes can be categorized into
COMMUNICATIONS SYSTEMS two which is illegal
perpetrated against computer
There are many threats to computer and the
or telecommunications and use of
communication system which are error, accident
and natural hazards. computer and telecommunications to
accomplish illegal acts by using the
HUMAN ERRORS computer as a tool

 Humans often are not good at assessing Other examples of computer crimes
their own information  theft of hardware
 Humans emotions effect their performance  theft of software
 Humans perceptions are slower compared  theft of intellectual properties
to the equipment information overload to  theft of time and services
humans can sometimes be a problem  theft of information.

PROCEDURAL ERRORS
SECURITY SAFEUARDS: PROTECTING COMPUTER
• When people fail to follow the steps and AND COMMUNICATION
instruction prepared, error tends to occur
Security is a system or software of safeguard for
SOFTWARE ERRORS protecting information technology against
facing disaster, system failures, and
• Software malware or bug : causes a program
also unauthorized access that can result in damage
or software to not run properly
and lost.
DIRTY DATA PROBLEMS

• Incomplete, out-dated or inaccurate source of Computer security can be divided into five


data components:

ELECTROMECHANICAL PROBLEMS 1. Deterrent (a thing that discourages or is


intended to discourage someone from doing
 Mechanical system can wear out or become something) to computer crime
damaged after a period of usage  Enforcing the law
 They can sometimes be badly designed or  CERT to provide round the clock
constructed information on international computer
security threats
 Power surges and failures can damage the
 Tools used to fight fraudulent
equipment connected and unauthorized  online uses
 Rule base detection software
 predictive statistical model software
NATURAL HAZARDS
 Employee internet management 
• Unpredictable and often lead to  Internet browsing filtering software
disaster when occurs  Electronic surveillance
2. Identification and access (TOPIC) Privacy Surveillance: Data Collectors and
Spies
 scan Verify legitimate right of access by
what you have, what you know, and who 1. As surveillance becomes a common element of
you are our daily lives, privacy is in danger of no longer
 What you have like keys, cards, signatures, being considered an intrinsic right.
badges
 What you know like pin numbers and 2. Everything from our web browsing to mobile
passwords devices and the Internet of Things (IoT) products
 Who are you like bio metrics such as face installed in our homes have the potential to erode
scan and finger print our privacy and personal security, and you cannot
depend on vendors or ever-changing surveillance
3. Encryption rules to keep them intact.

 The process of altering and changing a data 3. Having "nothing to hide" doesn't cut it anymore.
into unreadable form to prevent We must all do whatever we can to safeguard our
unauthorized access personal privacy. Taking the steps outlined below
 Advantage is data is available over the can not only give you some sanctuary from
internet  spreading surveillance tactics but also help keep
 Disadvantage is law officer may not be able you safe from cyber attackers.
to read the data. 
PERSONALLY IDENTIFIABLE Information
4. Protection of software and data
Known as PII, this can include your name, physical
 Restrict access to online files; use home address, email address, telephone numbers,
transaction logs\ date of birth, marital status, Social Security
 Use audit controls to track who used what numbers (US)/National Insurance numbers (UK),
programs and servers, which files were and other information relating to your medical
opened, and so on status, family members, employment, and
 Use people controls—screen applicants; do education
background checks;
monitor Internet, email, and computer Data management is at the heart of privacy
usage; use shredders for discarded
documents and materials Data is a vague concept and can encompass such a
wide range of information that it is worth briefly
5. Disaster recovery plan breaking down different collections before
examining how each area is relevant to your
 Method of retrieving important data and privacy and security.
information after a disaster has happened
 Data storage system must be kept WHY DOES IT MATTER?
separately and data have to be backed up
 Back up all data and keep in mainframes in
different positions
All this data, whether lost in different data  Is a powerful presentation software
breaches or stolen piecemeal through phishing developed by Microsoft
campaigns, can provide attackers with enough  It is a standard component of the
information to conduct identity theft, take out
company’s Microsoft Office suit software,
loans using your name, and potentially
compromise online accounts that rely on security and is bundled together with word, Excel
questions being answered correctly. In the wrong and other Office productivity
hands, this information can also prove to be a gold  is a slideshow presentation program first
mine for advertisers lacking a moral backbone. developed by Forethought, Inc. for the
Macintosh computer in 1987
BROWSING HABITS AND WEBSITE VISITS
 Microsoft has released several updated
Internet activity is monitored by an Internet Service versions, each offering more features and
Provider (ISP) and can be hijacked. While there is incorporating better technology than the
little consumers we can do about attacks at this one before it. The most current version
level, the web pages you visit can also be tracked of Microsoft PowerPoint is available
by cookies, which are small bits of text that are in Office 365
downloaded and stored by your browser. Browser
plugins may also track your activity across multiple Parts of MS PowerPoint
websites.
 Office Button- is located on the upper-left
corner of the PowerPoint window
SECURE OTHER BROWSERS  Quick access toolbar- is the collection of
Cookies: Clearing out your cookie caches and button that provide one click access to
browser histories can prevent ad networks from commonly used commands such as
collecting too much information about you. The o Save- to save files
easiest way to do so is to clear the cache o Undo- to rollback action taken
(Firefox, Chrome, Opera, Safari, Edge). o Redo- to reapply an action you
rolled back
HTTP v. HTTPS: When you visit a website address,
you will be met with either Hypertext Transfer  Title bar – it is located at the top in the
Protocol (HTTP) or Hypertext Transfer Protocol center of the PowerPoint window. It
Secure (HTTPS). The latter option uses a layer of displays the presentation name followed by
encryption to enable secure communication a program name
between a browser and a server.  Menu bar- it contains a list of options to
manage and customize PowerPoint
WHY DOES IT MATTER?
presentation
Cookies are used to personalize internet  Toolbars- below the menu bar. And there
experiences and this can include tailored are 16 different toolbars. The two most
advertising. However, such tracking can go too far, common ones are the Standard and
as shown when the unique identifiers added to a Formatting Toolbar. When several toolbars
cookie are then used across different services and are docked on the same row, they might
on various marketing platforms. Such practices are show only the buttons that you have used
often considered intrusive. most recently.

Microsoft PowerPoint
 Minimize Button- a feature of a graphics  Slide show- this view is used to display each
based operating system that hides the slide full screen the way your audience will
application currently on screen see it
 Maximize Button- a feature of a graphic  Zoom control- is used for magnifying and
based operating system that enlarges the shrinking of active PowerPoint presentation
window to the size of the screen
 Close Button- a button in the upper right
corner of a window with an “X” in it. It close
Digital Laws and Ethics in Business
the program running in the current window
 Outline and Sliders Tabbed pane- allows Computer and Internet Crimes
the user to easily view the presentation in
outline format (text), as well as a list of all Computer Crimes or Cybercrime
the slides in the presentation (with visuals)  Refers to any crimes that involves a
 Slide- the area which will be displayed as computer and a network , where the
full screen when viewed in Slide Show computer may or may not have played an
mode instrumental part in the commission of a
 Placeholders- displayed as dotted lines crime
which allows you to identify where you can  Refers more precisely o criminal
add text and insert elements such as images exploitation of the internet
and tables
 Insertion Point- it is the blink vertical line in Two types of Computer Crimes
your presentation. It indicates where you
1. Crimes that target computer network or
can enter text on the slide
devices directly
 Ruler- it used to set the alignment and
2. Crimes facilitated computer networks or
margins of the elements in the presentation
devices, the primary target of which is
 Vertical Scrollbar- a scroll bar to use when
independent of the computer network or
you want to scroll vertically through the
device
PowerPoint window
 Horizontal Scrollbar- a scroll bar to use Exploit
when you want to scroll horizontally
 Is an attack on an information system that
through the PowerPoint window
takes advantage of a particular system
 Status Bar- displays slide position and the
vulnerability
type of design in PowerPoint
 Notes Areas-a place that you add notes to Types of Exploits
each slides content
 Normal View – the most commonly used 1. Computer Viruses
view to create, edit or modify your 2. Worms
PowerPoint presentation 3. Trojan Horse
 Slide Sorter View- is commonly used to 4. Botnet
delete slides, rearrange, slides, cut, copy or 5. Distributed Denial of service attacks
paste slides 6. Rootkit
7. Email Spam
8. Phishing  Refers to listening to, recording, monitoring
9. Computer Fraud or surveillance of the content of
communication, including procurement of
the content of data, either directly through
Types of Perpetrators access and use of a computer system or
indirectly through the use of electronic
1. Hackers eavesdropping or tapping devices at the
2. Malicious Insider same time that the communication is
3. Industrial Spies occurring
4. Cybercriminals
5. Hacktivism and Cybertererrorist Offenses against the Confidentiality, Integrity and
Availability of Computer Data and System
Cyber Crime Law
1. Illegal Access
 Republic Act No. 10175 2. Illegal Interception
o An act defining cybercrime, 3. Data Interference
providing for the prevention, 4. System Interference
investigation, suppression and the 5. Misuse of Devices
imposition of penalties thereof and 6. Cyber- squatting
for other purpose
 Electronic Commerce Act of 2000 (RA No. Computer- Related Offense
8792) 1. Computer Forgery
o An act providing for the recognition 2. Computer Related Fraud
and use of electronic commercial 3. Computer Related Identity Theft
and non-commercial transactions
and documents, penalties for Content Related Offenses
unlawful use thereof and for other
1. Cybersex
purposes.
2. Child Pornography
ACCESS 3. Unsolicited Commercial Communication
4. Libel
 Refers to the instruction, communication
with, storing data in, retrieving data from,
or otherwise making use of any resources of
a computer system of communication
network Ten Commandments of Computer Ethics

Cyber 1. Thou shall not use a computer to harm


other people
 Refers to a computer network, the
2. Thou shalt interfere with other people
electronic medium in which online
3. Thou shalt nit snoop around in other
communication takes place
people’s files
Interception 4. Thou shat not use a computer to steal
5. Thou shalt not use a computer t5o bear a
false witness
6. Thou shalt not use or copy software for Republic Act No. 8293
which you have not paid
 An act prescribing the intellectual property
7. Thou shalt not use other people’s computer
code and establishing the intellectual
resources without authorization
property office, providing for its powers
8. Thou shalt not use appropriate other
and functions and for other purposes
people’s intellectual output
9. Thou shalt think about the social
consequence of the program you write
10. Thou shalt use a computer in ways that
show consideration and respect

Applicable Philippine Laws That Penalize


Cybercrime

 Republic Act No. 10175 Section 4


Paragraph A (LIBEl)
o The unlawful or prohibited acts of
Social Networking
libel as defined in Article 335 of the
Revised Penal Code, as amended,  Are the most means of communication used
committed through a computer by a large number of people especially the
system or any other similar means youth
which may be devised in the future  Is a social structure made of nodes that are
tied by one or more specific types of
interdependency such as values, vision,
 Cybercrime Prevention Act of 2012 ideas financial exchange friendship kinship
o Act defining cybercrime, prevention, dislike conflict or trade
investigation, suppression and the
Types of Social Network
imposition of penalties thereof and
for other purposes 1. Socializing: Online Communities- Facebook,
We Chat, Meet me, MySpace
Intellectual Property Law
2. Carrier and Business Opportunities:
 Award to investors, artist and institutions Business Network- LinkedIn, Viadeo, XING
certain exclusive rights to produce, copy , 3. Matchmaking, Soul mate: Online
distribute and license goods and Matchmaking- Shaadi, Adult Friend Finder,
technologies Bharatmatrimo
 How are they Protected? 4. Getting Back in Touch: Alumni Network-
1. By patented objects Facebook, Classmates.com Orkut
2. By trademarks
Features on Social Network
3. By industrial design
4. By trade secrets 1. Messaging
5. By layout design 2. News
6. By geographical Indication 3. Communities
4. Like buttons
5. Games
6. Audio and Video Uploads

Potrebbero piacerti anche