THE DANGERS OF COMPUTER CRIME
Module 2.2
INTRODUCTION
Computer crime can be seen in two ways :
Where a computer system is the target of the crime
Where computer technology is used to enable or commit the crime
Social engineering
To manipulate someone into giving out any information that can be used to impersonate them
Malware
Software designed to install itself without the user’s knowledge and to affect or harm a computer
system ( viruses and spyware )
TECHNIQUES AND TOOLS USED TO COMMIT COMPUTER CRIMES
Phishing
To con the user into giving out personal and confidential details
Spoofing
Forgery of an e-mail header to appear from a different origin
Computer worm
Malware that’s able to distribute itself over a network
Computer virus
Written to disrupt the normal functioning of a computer without the user’s knowledge or consent
Used to spread malware or to create security loopholes for programs to exploit
Rootkit
Malware that’s hidden within an existing filing system
Backdoor
Uses loopholes in the security or programming to gain access to a system
Spyware
Monitors and tracks the way you use your computer without consent
Module 2.2
INTRODUCTION
Computer crime can be seen in two ways :
Where a computer system is the target of the crime
Where computer technology is used to enable or commit the crime
Social engineering
To manipulate someone into giving out any information that can be used to impersonate them
Malware
Software designed to install itself without the user’s knowledge and to affect or harm a computer
system ( viruses and spyware )
TECHNIQUES AND TOOLS USED TO COMMIT COMPUTER CRIMES
Phishing
To con the user into giving out personal and confidential details
Spoofing
Forgery of an e-mail header to appear from a different origin
Computer worm
Malware that’s able to distribute itself over a network
Computer virus
Written to disrupt the normal functioning of a computer without the user’s knowledge or consent
Used to spread malware or to create security loopholes for programs to exploit
Rootkit
Malware that’s hidden within an existing filing system
Backdoor
Uses loopholes in the security or programming to gain access to a system
Spyware
Monitors and tracks the way you use your computer without consent