Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate),...
Transcript of Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate),...
Beas 25
Fig. 3-8 “Worm Virus” Below [26]
There are different types of computer worms.
This one happens with the instant messaging service. A
computer worm is similar to a virus, but unlike viruses
(which need a carrier in order to replicate), worms
replicate in their entirely, creating exact copies of
themselves. In other words, a worm is a program that
reproduces itself and can run independently and travel
across network connections at rapid pace.
Beas 26
Fig. 3-9 “How Viruses Work” [12]
1. Most virus show up inside email attachments.
2. Execute. Opening the file or running it activates the virus, which inserts copies of itself
into files and other locations on your computer.
3. Infections spread. Make email copies of themselves to other computers.
4. The payload hits. At some point after the file was executed, the virus performs its
programmed action from erasing your hard drive to inserting jokes in your documents.
Beas 27
Prevention (Computer Viruses)
Fig. 3-10 “Types of Antivirus” [2]
Being cautious with the emails you receive and the attachments and links that you open
is one way to prevent viruses. If you see any, delete them. Also, keeping your system up to date
with the latest updates available helps you reduce any viruses. Finally, running an antivirus
service is critical in a way to detect if any and destroy computer viruses.
Beas 28
Fig. 3-11 “Norton 360 PC Protection” [8] This is an example of an anti-virus product that is currently in the market. The purpose
of this product is to protect one’s private information, and to keep computers secure from
many viruses. This particular screen shot shows that the computer has run all the current live
updates currently available, thus “you are protected.”
Beas 29
Fig. 3-12 “Cybercrime Table”
Shown above is a cybercrime table to display pieces of information about cybercrimes.
The tables are separated into main table with two separate tables. The table on the left has two
columns. In the first column, there is a list of types of cybercrimes currently known (not an
extensive list, but it does show the most common crimes). Highlighted cybercrimes are the ones
mentioned in this paper. The column that follows are the years these cybercrimes became
Beas 30
widely known. The table on your right displays more information regarding these cybercrimes.
The crimes are categorized by the most damaging. The cyber crimes costs are followed by
defense mechanisms. The last column directs the reader for further information.
Beas 31
4 REFERENCES
1. ""Phishing" (or "Pharming")." Citizens Bank of Edmond. 2010. Web. 30 Mar. 2012.
<http://www.citizensedmond.com/Security/phishing.cfm>.
2. "3its - Leading IT Company Worldwide." 3its. 2008. Web. 5 Apr. 2012.
<http://www.3its.com/>.
3. "Computer Crime Laws." PBS. PBS. Web. 11 Apr. 2012.
<http://www.pbs.org/wgbh/pages/frontline/shows/hackers/blame/crimelaws.html>.
4. "cybercrime." Encyclopedia Britannica. Encyclopedia Britannica 2009 Student and Home
Edition. Chicago: Encyclopedia Britannica, 2009.
5. "Darx Computers." First Computer Virus. 27 Sept. 2011. Web. 01 Apr. 2012.
<http://www.darxcomputers.com/2011/archives/first-computer-virus/>.
6. "E-COMMERCE WONDERLAND." E-COMMERCE WONDERLAND. E-commerce 4u, 25 June
2009. Web. 26 Mar. 2012. <http://www.e-commercewonderland.blogspot.com>.
7. "How Much Does Identity Theft Cost - Personal Story - Philadelphia Media Mom, Joey
Fortman - A Real Mom in the Media." How Much Does Identity Theft Cost. 29 Jan. 2011.
Web. 26 Apr. 2012. <http://www.joeyfortman.com/journal/2011/1/29/how-much-
does-identity-theft-cost-personal-story.html>.
8. "Norton 360 (Version 4.0) Screen Shots:." Norton 360 Version 4.0 Screenshots. Web. 15
Mar. 2012. <http://www.antivirusware.com/norton-360/screenshots/>.
Beas 32
9. "PhishTank | Join the Fight against Phishing." PhishTank. Web. 25 Mar. 2012.
<http://www.phishtank.com>.
10. "Who Music Theft Hurts." Http://www.riaa.com. Web. 19 Apr. 2012.
<http://www.riaa.com/physicalpiracy.php?content_selector=piracy_details_online>.
11. Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the
Internet. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. Print.
12. EO. "My PC Has a Virus, Now What?" ERDAL OZKAYA. 24 Feb. 2012. Web. 07 Apr. 2012.
<http://www.erdalozkaya.com/post/2012/02/24/My-PC-has-a-virus-now-what-.aspx>.
13. Fites, Philip E., Johnston, Peter, and Kratz, Martin. The Computer Virus
Crisis.VanNostrand Reinhold/ New York, 1989.
14. Grabosky, Peter N. Crime in the Digital Age. Transaction Publishers/ The Federation
Press, 1998.
15. Graham, Cluley. "The Friday the 13th Virus." Naked Security. 13 Aug. 2010. Web. 31
Mar. 2012. <http://nakedsecurity.sophos.com/2010/08/13/friday-13th-virus/>.
16. Hinduja, Sameer. Music Piracy and Crime Theory. New York, NY, USA: LFB Scholarly
Publishing LLC, 2005. p 13. http://site.ebrary.com/lib/csudh/Doc?id=10159254&ppg=25
17. Hinduja, Sameer. Music Piracy and Crime Theory. New York, NY, USA: LFB Scholarly
Publishing LLC, 2005. p 22. http://site.ebrary.com/lib/csudh/Doc?id=10159254&ppg=34
18. Hinduja, Sameer. Music Piracy and Crime Theory. New York, NY, USA: LFB Scholarly
Publishing LLC, 2005. p 23. http://site.ebrary.com/lib/csudh/Doc?id=10159254&ppg=35
19. Hinduja, Sameer. Music Piracy and Crime Theory. New York, NY, USA: LFB Scholarly
Publishing LLC, 2005. p 25. http://site.ebrary.com/lib/csudh/Doc?id=10159254&ppg=37
Beas 33
20. Hinduja, Sameer. Music Piracy and Crime Theory. New York, NY, USA: LFB Scholarly
Publishing LLC, 2005. p 34. http://site.ebrary.com/lib/csudh/Doc?id=10159254&ppg=46
21. Hinduja, Sameer. Music Piracy and Crime Theory. New York, NY, USA: LFB Scholarly
Publishing LLC, 2005. p 35. http://site.ebrary.com/lib/csudh/Doc?id=10159254&ppg=47
22. Hinduja, Sameer. Music Piracy and Crime Theory. New York, NY, USA: LFB Scholarly
Publishing LLC, 2005. p 35. http://site.ebrary.com/lib/csudh/Doc?id=10159254&ppg=47
23. Hinduja, Sameer. Music Piracy and Crime Theory. New York, NY, USA: LFB Scholarly
Publishing LLC, 2005. p 37. http://site.ebrary.com/lib/csudh/Doc?id=10159254&ppg=49
24. Hruska, Jan. Computer Viruses and Anti-Virus Walfare. Ellis Horwood, 1990.
25. Hypponen, Mikko. "Future of Cybercrime: Three Types of Online Attacks Are Explained
by Expert Mikko Hypponen." FUTUREPREDICTIONS.COM Source of Likely and Preferable
Futures. 21 Jan. 2012. Web. 29 Mar. 2012. <http://futurepredictions.com>.
26. Liane, Cassavoy. "Viruses Target IM." PCWorld. PCW Print, 4 May 2004. Web. 15 Apr.
2012. <http://www.pcworld.com/article/115837/viruses_target_im.html>.
27. Mirkovic, Jelena. Internet Denial of Service: Attack and Defense Mechanisms. Upper
Saddle River, NJ: Prentice Hall Professional Technical Reference, 2005. Print.
28. Moore, Adam D. Intellectual Property& Information Control. Transaction Publishers/
New Brunswick (U.S.A.) and London (U.K.), 2001.
29. Paul, Sara R. "- Identity Theft: Outline of Federal Statutes and Bibliography of Select
Resources." Features. 17 Nov. 2006. Web. 9 Apr. 2012.
<http://www.llrx.com/features/idtheftguide.htm>.
Beas 34
30. Smail, Mark. "Data Encryption Tool Maker: Antivirus Has Become Ineffective."
BetaNews. TechNewsWorld, 2010. Web. 03 Mar. 2012.
<http://betanews.com/2010/01/22/data-encryption-tool-maker-antivirus-has-become-
ineffective/>.
31. Threats and Defense Mechanisms. Australia: Course Technology Cengage Learning,
2010. Print.
Beas 35
5 APPENDIX
Cybercrimes are defined as “an umbrella term that covers both the Internet
crime and intellectual crime. In other words, cybercrimes are those crimes that can be
done with or without the help of the Internet.” Some examples of cybercrimes include
internet scams, hacking, viruses, child pornography, piracy of movies and music file
sharing, internet fraud, identity theft, denial of service attack, etc. I will focus my paper
on the three crimes: music piracy, identity theft, and computer viruses. I will define the
three types of common crimes listed above, legal consequences, real life scenarios,
preventative measures that are currently enforced, and also some controversy
surrounding these issues. In this paper, I will discuss the different types of security
measures used to prevent and enforce the current laws. However, the frequency of
these crimes comes to show us that these measures do not withstand the speed that
the criminals are moving in to counter the preventative measures. I will use current
laws as resources and evidence, but also incorporate my own suggestions and
recommendations to these topics.
Beas 36
Beas 37