Title: Crime
1Crime
By Andrea Carrigan
2Definition of CRIME
CRIME - A crime is a wrongdoing classified by the
state or Congress as a felony or misdemeanor.A
crime is an offence against a public law. This
word, in its most general sense, includes all
offences, but in its more limited sense is
confined to felony.
3Definition of DENIAL of SERVICE
Denial-of-Service Attack (DoS attack) is an
attempt to make a computer resource unavailable
to its intended users. Typically the targets are
high-profile web servers, and the attack attempts
to make the hosted web pages unavailable on the
Internet.
4Definition of DENIAL of SERVICE (con't)
It is an Internet crime that violates the
Internet proper use policy as indicated by the
Internet Architecture Board (IAB).
5Definition of DENIAL of SERVICE (con't)
- DoS attacks have two general forms
- Force the victim computer(s) to reset or consume
its resources such that it can no longer provide
its intended service. - Obstruct the communication media between the
intended users and the victim so that they can no
longer communicate adequately.
6Definition of DENIAL of SERVICE (con't)
Not all service outages, even those that result
from malicious activity, are necessarily
denial-of-service attacks. Other types of attack
may include a denial of service as a component,
but the denial of service may be part of a larger
attack.
7Definition of WORM
A computer worm is a self-replicating computer
program. It uses a network to send copies of
itself to other nodes (computer terminals on the
network) and it may do so without any user
intervention. Unlike a virus, it does not need
to attach itself to an existing program. Worms
always harm the network (if only by consuming
bandwidth), whereas viruses always infect or
corrupt files on a targeted computer.
8Definition of VIRUS
A computer virus is a computer program that can
copy itself and infect a computer without
permission or knowledge of the user. The original
may modify the copies or the copies may modify
themselves, as occurs in a metamorphic virus.
9Definition of VIRUS (con't)
A virus can only spread from one computer to
another when its host is taken to the uninfected
computer, for instance by a user sending it over
a network or carrying it on a removable medium
such as a floppy disc, CD, or USB drive.
10Definition of VIRUS (con't)
Additionally, viruses can spread to other
computers by infecting files on a network file
system or a file system that is accessed by
another computer. Viruses are sometimes confused
with computer worms and Trojan horses.
11Definition of VIRUS (con't)
A worm, however, can spread itself to other
computers without needing to be transferred as
part of a host. A Trojan horse is a file that
appears harmless until executed. In contrast to
viruses, Trojan horses do not insert their code
into other computer files.
12Definition of VIRUS (con't)
Many personal computers are now connected to the
Internet and to local-area networks, facilitating
their spread. Today's viruses may also take
advantage of network services such as the World
Wide Web, email, and file sharing systems to
spread, blurring the line between viruses and
worms. Furthermore, some sources use an
alternative terminology in which a virus is any
form of self-replicating malware.
13Definition of VIRUS (con't)
The term comes from the term virus in biology. A
computer virus reproduces by making, possibly
modified, copies of itself in the computer's
memory, storage, or over a network. This is
similar to the way a biological virus works.
14Example of Personal Negligence leading to CRIME
Computer Negligence Irresponsible actions that
result in the deletion of a bank account or the
premature discontinuation of electrical service.
For example, if someone neglects their child
then they will more than likely have DSS
(Department of Social Services) come and take the
children away. Then the parents will probably go
to jail.
15Example of Incompetence leading to CRIME
Computer incompetence is when a company or
program loses something due to carelessnes or
someone not being able to control the software.
For example, in 1992 a few minutes before closing
time a Salomon Brothers, Inc. clerk hit the wrong
key on a program-trading terminal and sent a sell
order for 500 million in 50 major stocks onto
the New York Stock Exchange. In the closing
minutes of trading the Dow Jones Industrial
Average dropped nearly 12 points.
16What is an E-MAIL HOAX?
An E-mail hoax is an act, document or artifact
intended to deceive the public. An example is
when someone sends you a message, usually
forwarded, and tells you to forward the message
to everyone you or something will happen. The
message usually has information that they say if
very important or urgent.
17What is an E-MAIL HOAX? (con't)
By changing certain properties of the e-mail,
such as the From, Return-Path and Reply-To fields
(which can be found in the message header),
ill-intentioned users can make the e-mail appear
to be from someone other than the actual sender.
It is often associated with website spoofing
which mimic an actual well-known website, but are
run by another party either with fraudulent
intentions or as a means of criticism of the
organizations activities.
18THE END!!!