Page 143 - DCAP516_COMPUTER_SECURITY
P. 143

Unit 11: Threats in Network




                                                                                                Notes


             Notes  Distributed denial-of-service attacks are a very perturbing problem for law
            enforcement agencies mainly because they are very difficult to trace. In addition, these
            attacks are usually directed towards very sensitive systems or networks sometimes even
            those that are vital to national security.
          13.  Other Internet  Crimes:  The list of Internet crimes can be very long. This includes
               pornographic websites; pornographic magazines produced using computers (to publish
               and print the material) and the Internet (to download and transmit pornographic pictures,
               photos, writings etc). This also includes sale of narcotics, weapons and wildlife, etc., by
               posting information on websites, auction websites, and bulletin boards or simply by
               using e-mail communication. There are millions of websites; all hosted on servers abroad,
               that offer online gambling. In fact, it is believed that many of these websites are actually
               fronts for money laundering. Cases of hawala transactions and money laundering over
               the Internet have been reported. Other major crimes include software piracy, copyright
               infringement, trademarks violations, theft of computer source code, etc.




              Task  Give two examples of the following:
            1.   Viruses
            2.   Bombs
            3.   Trojan Horses
            4.   Sparse Infectors

            5.   Packet Sniffers

          Self Assessment

          Fill in the blanks:
          1.   Section 66 of the Information Technology Act, 2000 defines the offence of …………………...
          2.   Packet sniffing, tempest attack, password cracking and buffer overflow are common
               techniques used for ………………………...
          3.   …………………… is the ability to monitor electro-magnetic emissions from computers in
               order to reconstruct the data.
          4.   ………………………..means decrypting a password or bypassing a protection scheme
               breaking a password.

          5.   Password crackers are utilities that try to …………………….. passwords.
          6.   Buffer overrun, input overflow and ………………………, this is probably the most common
               way of breaking into a computer.

          7.   ……………………. are the most popular Trojans.
          8.   ……………………………. search the victim’s computer for passwords and then send them
               to the attacker or the author of the Trojan.

          9.   ……………………… is a technology used by hackers to intercept and decrypt the data
               packets flowing on a computer network.




                                           LOVELY PROFESSIONAL UNIVERSITY                                   137
   138   139   140   141   142   143   144   145   146   147   148