Preview

Internet Crime and its Prevention

Better Essays
Open Document
Open Document
4910 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Crime and its Prevention
De La Salle University - Manila

An Introduction to the IM Profession and Ethics Paper
Presented to
The Faculty of the College of Computer Studies
De La University – Manila

In Partial Fulfillment
Of the Requirements for the Degree of
Bachelor of Science of Information Systems

By:

Changcoco, Amos
Dimla, Ysabel Nicole
Ramchand, Pavan
Tanchuling, Bianca Denise
Tibayan, Jan Michael

1.0 COMPUTER AND INTERNET CRIME
1.1 Types of Exploits
1.1.1 Virus
It is a malicious code that is attached to a file or executable program that can hack the files of the victim’s computer and reformat, delete or modify the files. The virus is executed only when the file that contains the virus is opened or if the program with the virus is executed as well. It leaves infections as it travels from one computer to another. The spread of the virus relies on the users whenever users would use removable media devices, download or through e-mails.
An example of a computer virus would be the Pikachu virus which was the first computer virus directed to children. It was said that the virus started on June 28, 2000 from Asia or the Pacific Ocean region. The virus was an email titled, “Pikachu Pokémon” with the message, “Pikachu is your friend.” The email contained the image of the cartoon character, ‘Pikachu’ from the TV series Pokémon, with the message, “Between millions of people around the world I found you. Don’t forget to remember this day every time MY FRIEND.”
The Pikachu virus infected only a few companies in the United States through Microsoft Outlook email attachments or through Microsoft’s Internet Explorer browser. The reason why only a few companies were harmed and why the virus was not as viral is that the virus was not coded properly and would ask the user if the virus can delete the files in the user.
1.1.2 Worm
A worm is a malicious code that is used for bringing down the computer system. A worm does not infect files, however, it monopolies the



References: * (1999, 10). Electronic Commerce. StudyMode.com. Retrieved 10, 1999, from http://www.studymode.com/essays/Electronic-Commerce-731.html * THE ELECTRONIC COMMERCE ACT (R.A. 8792) AN OVERVIEW OF ITS (INFORMATION TECHNOLOGY) IMPACT ON THE PHILIPPINE LEGAL SYSTEM(2005 006). 'www.ustlawreview.com/pdf/vol.L/Articles/The_Electronic_Commerce_Act_RA_8792.pdf * What Is the Difference: Viruses, Worms, Trojans, and Bots? - Cisco Systems. (n.d.). Cisco Systems, Inc. Retrieved from http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html * What Is A Rootkit? (n.d.). Internet / Network Security - Tips, Advice and Tutorials About Internet Security and Network Security. Retrieved from http://netsecurity.about.com/od/frequentlyaskedquestions/f/faq_rootkit.htm * Julian. (2011). 10 Most Notorious Acts of Corporate Espionage. Retrieved from http://www.businesspundit.com/10-most-notorious-acts-of-corporate-espionage/ * Katich, A. (2013). Anonymous (Annie Katich). Retrieved from http://socialactive.wordpress.com/2013/02/25/anonymous-annie-katich/ * Verini, J. (2010). The Great Cyberheist. Retrieved from http://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html/

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Email worms – A worm that can attach itself to a computer system when a user open’s an unknown attachment in an email.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    1. What are the various types of malware? How do worms differ from viruses? Do Trojan…

    • 639 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Us Vs Arabo Case Study

    • 459 Words
    • 2 Pages

    This was causing disruption to the operations of major online retail businesses, data backup, and companies that provide communications, banks, and information services to the medical and pharmaceutical industries resulting in severe attacks of their corporate websites, internet access, data-storage, e-mail and disaster-recovery systems. The infected computers also targeted students at two college campuses in Pennsylvania and Massachusetts. Based on what I found in my research, an estimate of $504,000 in financial losses resulted from these…

    • 459 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Base on the premise that there is a mix of computers running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    * This virus can duplicate itself to no end. It will send itself ro everyone in your address book appearing as an email sent from your email address.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Chipopo Research Paper

    • 343 Words
    • 2 Pages

    When a computer get infected with this virus, the computer screen will be flooded with various unexpected advertisements which can prevent a user from surfing on the Internet normally.The group of hackers created this adware to earn quick money by creating online traffic through which they can generate pay-per-click and marketing revenue.…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When it comes to viruses and the types that get put onto your computer there are many of them. For example: the Trojan Horse, it is put into your computer by saying it is good for file converting or cleaning a system out, when it is really putting bad programs into your computer along with spyware and other potentially harmful programs. Just like when you go into your email and you see an…

    • 783 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    True or False: A computer worm consists of segments of code that perform malicious actions.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ollie mullin

    • 866 Words
    • 4 Pages

    It attacked via-email and sent an email with the subject of “ILOVEYOU”. When the user opened the message it would infect the computer and everyone else’s in the address book.…

    • 866 Words
    • 4 Pages
    Good Essays