Page 143 - DCAP516_COMPUTER_SECURITY
P. 143
Unit 11: Threats in Network
Notes
Notes Distributed denial-of-service attacks are a very perturbing problem for law
enforcement agencies mainly because they are very difficult to trace. In addition, these
attacks are usually directed towards very sensitive systems or networks sometimes even
those that are vital to national security.
13. Other Internet Crimes: The list of Internet crimes can be very long. This includes
pornographic websites; pornographic magazines produced using computers (to publish
and print the material) and the Internet (to download and transmit pornographic pictures,
photos, writings etc). This also includes sale of narcotics, weapons and wildlife, etc., by
posting information on websites, auction websites, and bulletin boards or simply by
using e-mail communication. There are millions of websites; all hosted on servers abroad,
that offer online gambling. In fact, it is believed that many of these websites are actually
fronts for money laundering. Cases of hawala transactions and money laundering over
the Internet have been reported. Other major crimes include software piracy, copyright
infringement, trademarks violations, theft of computer source code, etc.
Task Give two examples of the following:
1. Viruses
2. Bombs
3. Trojan Horses
4. Sparse Infectors
5. Packet Sniffers
Self Assessment
Fill in the blanks:
1. Section 66 of the Information Technology Act, 2000 defines the offence of …………………...
2. Packet sniffing, tempest attack, password cracking and buffer overflow are common
techniques used for ………………………...
3. …………………… is the ability to monitor electro-magnetic emissions from computers in
order to reconstruct the data.
4. ………………………..means decrypting a password or bypassing a protection scheme
breaking a password.
5. Password crackers are utilities that try to …………………….. passwords.
6. Buffer overrun, input overflow and ………………………, this is probably the most common
way of breaking into a computer.
7. ……………………. are the most popular Trojans.
8. ……………………………. search the victim’s computer for passwords and then send them
to the attacker or the author of the Trojan.
9. ……………………… is a technology used by hackers to intercept and decrypt the data
packets flowing on a computer network.
LOVELY PROFESSIONAL UNIVERSITY 137