Professional Documents
Culture Documents
Computer Crime
Cyber criminals steal intellectual property and commit fraud, unleash viruses and commit acts of cyber terrorism. Computer crime is defined by Association of Information Technology Professionals (AITP) as including Unauthorized use, access, modification and destruction of hardware, software, data or network resources Unauthorized release of information Unauthorized copying of software Denying an end user access to his/her own computer or networking resources Using or conspiring to use computer or network resources to obtain information or tangible property illegally AITP promoted this definition in a Model Computer Crime Act and is reflected in many computer crime laws. Cyber thieves use many tools, from scans that ferret out weakness in Website software programs to sniffers that snatch passwords.
Hacking tactics
Scans: Widespread probes of Internet to determine types of computers, services and connections. Sniffer: Programs that covertly search individual packets of data as they pass through Internet, capturing passwords or entire contents. Spoofing: Faking an email address or Web page to trick users into passing along critical information like passwords or credit card numbers. Trojan horse: A program, unknown to user, contains instructions that exploit known vulnerability in some software. Back doors: In case original entry point has been detected, having a few hidden ways back makes reentry easy and difficult to detect. Malicious applets: Tiny programs, sometimes written in popular Java language, that misuse your computers resources, modify files on hard disk, send fake email or steal passwords. War dialing: Programs that automatically dial thousands of phone numbers in search of a way through modem connection. Logic bombs: A program instruction that triggers a malicious act.
Software piracy
Buffer overflow: A technique for crashing or gaining control of computer by sending too much data to buffer in computer memory. Password crackers: Software that can guess passwords. Social engineering: A tactic used to gain access to computer systems by talking unsuspecting company employees out of valuable information such as passwords. Dumpster diving: Sifting through companys garbage to find information for breaking into their computers. Unauthorized copying of software, or software piracy, is major form of software theft. Software Publishers Association files lawsuits against major corporations that allowed it. Software is intellectual property protected by copyright law and user licensing agreements. Public domain software is not copyrighted. Only 65% of software purchases in 2006 was legally acquired.