An Introduction to the IM Profession and Ethics Paper
Presented to
The Faculty of the College of Computer Studies
De La University – Manila
In Partial Fulfillment
Of the Requirements for the Degree of
Bachelor of Science of Information Systems
By:
Changcoco, Amos
Dimla, Ysabel Nicole
Ramchand, Pavan
Tanchuling, Bianca Denise
Tibayan, Jan Michael
1.0 COMPUTER AND INTERNET CRIME
1.1 Types of Exploits
1.1.1 Virus
It is a malicious code that is attached to a file or executable program that can hack the files of the victim’s computer and reformat, delete or modify the files. The virus is executed only when the file that contains the virus is opened or if the program with the virus is executed as well. It leaves infections as it travels from one computer to another. The spread of the virus relies on the users whenever users would use removable media devices, download or through e-mails.
An example of a computer virus would be the Pikachu virus which was the first computer virus directed to children. It was said that the virus started on June 28, 2000 from Asia or the Pacific Ocean region. The virus was an email titled, “Pikachu Pokémon” with the message, “Pikachu is your friend.” The email contained the image of the cartoon character, ‘Pikachu’ from the TV series Pokémon, with the message, “Between millions of people around the world I found you. Don’t forget to remember this day every time MY FRIEND.”
The Pikachu virus infected only a few companies in the United States through Microsoft Outlook email attachments or through Microsoft’s Internet Explorer browser. The reason why only a few companies were harmed and why the virus was not as viral is that the virus was not coded properly and would ask the user if the virus can delete the files in the user.
1.1.2 Worm
A worm is a malicious code that is used for bringing down the computer system. A worm does not infect files, however, it monopolies the
References: * (1999, 10). Electronic Commerce. StudyMode.com. Retrieved 10, 1999, from http://www.studymode.com/essays/Electronic-Commerce-731.html * THE ELECTRONIC COMMERCE ACT (R.A. 8792) AN OVERVIEW OF ITS (INFORMATION TECHNOLOGY) IMPACT ON THE PHILIPPINE LEGAL SYSTEM(2005 006). 'www.ustlawreview.com/pdf/vol.L/Articles/The_Electronic_Commerce_Act_RA_8792.pdf * What Is the Difference: Viruses, Worms, Trojans, and Bots? - Cisco Systems. (n.d.). Cisco Systems, Inc. Retrieved from http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html * What Is A Rootkit? (n.d.). Internet / Network Security - Tips, Advice and Tutorials About Internet Security and Network Security. Retrieved from http://netsecurity.about.com/od/frequentlyaskedquestions/f/faq_rootkit.htm * Julian. (2011). 10 Most Notorious Acts of Corporate Espionage. Retrieved from http://www.businesspundit.com/10-most-notorious-acts-of-corporate-espionage/ * Katich, A. (2013). Anonymous (Annie Katich). Retrieved from http://socialactive.wordpress.com/2013/02/25/anonymous-annie-katich/ * Verini, J. (2010). The Great Cyberheist. Retrieved from http://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html/