Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate),...

13
Beas 25 Fig. 3-8 “Worm Virus” Below [26] There are different types of computer worms. This one happens with the instant messaging service. A computer worm is similar to a virus, but unlike viruses (which need a carrier in order to replicate), worms replicate in their entirely, creating exact copies of themselves. In other words, a worm is a program that reproduces itself and can run independently and travel across network connections at rapid pace.

Transcript of Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate),...

Page 1: Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate), wormscsc.csudh.edu/cae/wp-content/uploads/sites/2/2013/11/... · 2015-03-10 · Fig. 3-8 ^Worm Virus Below

Beas 25

Fig. 3-8 “Worm Virus” Below [26]

There are different types of computer worms.

This one happens with the instant messaging service. A

computer worm is similar to a virus, but unlike viruses

(which need a carrier in order to replicate), worms

replicate in their entirely, creating exact copies of

themselves. In other words, a worm is a program that

reproduces itself and can run independently and travel

across network connections at rapid pace.

Page 2: Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate), wormscsc.csudh.edu/cae/wp-content/uploads/sites/2/2013/11/... · 2015-03-10 · Fig. 3-8 ^Worm Virus Below

Beas 26

Fig. 3-9 “How Viruses Work” [12]

1. Most virus show up inside email attachments.

2. Execute. Opening the file or running it activates the virus, which inserts copies of itself

into files and other locations on your computer.

3. Infections spread. Make email copies of themselves to other computers.

4. The payload hits. At some point after the file was executed, the virus performs its

programmed action from erasing your hard drive to inserting jokes in your documents.

Page 3: Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate), wormscsc.csudh.edu/cae/wp-content/uploads/sites/2/2013/11/... · 2015-03-10 · Fig. 3-8 ^Worm Virus Below

Beas 27

Prevention (Computer Viruses)

Fig. 3-10 “Types of Antivirus” [2]

Being cautious with the emails you receive and the attachments and links that you open

is one way to prevent viruses. If you see any, delete them. Also, keeping your system up to date

with the latest updates available helps you reduce any viruses. Finally, running an antivirus

service is critical in a way to detect if any and destroy computer viruses.

Page 4: Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate), wormscsc.csudh.edu/cae/wp-content/uploads/sites/2/2013/11/... · 2015-03-10 · Fig. 3-8 ^Worm Virus Below

Beas 28

Fig. 3-11 “Norton 360 PC Protection” [8] This is an example of an anti-virus product that is currently in the market. The purpose

of this product is to protect one’s private information, and to keep computers secure from

many viruses. This particular screen shot shows that the computer has run all the current live

updates currently available, thus “you are protected.”

Page 5: Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate), wormscsc.csudh.edu/cae/wp-content/uploads/sites/2/2013/11/... · 2015-03-10 · Fig. 3-8 ^Worm Virus Below

Beas 29

Fig. 3-12 “Cybercrime Table”

Shown above is a cybercrime table to display pieces of information about cybercrimes.

The tables are separated into main table with two separate tables. The table on the left has two

columns. In the first column, there is a list of types of cybercrimes currently known (not an

extensive list, but it does show the most common crimes). Highlighted cybercrimes are the ones

mentioned in this paper. The column that follows are the years these cybercrimes became

Page 6: Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate), wormscsc.csudh.edu/cae/wp-content/uploads/sites/2/2013/11/... · 2015-03-10 · Fig. 3-8 ^Worm Virus Below

Beas 30

widely known. The table on your right displays more information regarding these cybercrimes.

The crimes are categorized by the most damaging. The cyber crimes costs are followed by

defense mechanisms. The last column directs the reader for further information.

Page 7: Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate), wormscsc.csudh.edu/cae/wp-content/uploads/sites/2/2013/11/... · 2015-03-10 · Fig. 3-8 ^Worm Virus Below

Beas 31

4 REFERENCES

1. ""Phishing" (or "Pharming")." Citizens Bank of Edmond. 2010. Web. 30 Mar. 2012.

<http://www.citizensedmond.com/Security/phishing.cfm>.

2. "3its - Leading IT Company Worldwide." 3its. 2008. Web. 5 Apr. 2012.

<http://www.3its.com/>.

3. "Computer Crime Laws." PBS. PBS. Web. 11 Apr. 2012.

<http://www.pbs.org/wgbh/pages/frontline/shows/hackers/blame/crimelaws.html>.

4. "cybercrime." Encyclopedia Britannica. Encyclopedia Britannica 2009 Student and Home

Edition. Chicago: Encyclopedia Britannica, 2009.

5. "Darx Computers." First Computer Virus. 27 Sept. 2011. Web. 01 Apr. 2012.

<http://www.darxcomputers.com/2011/archives/first-computer-virus/>.

6. "E-COMMERCE WONDERLAND." E-COMMERCE WONDERLAND. E-commerce 4u, 25 June

2009. Web. 26 Mar. 2012. <http://www.e-commercewonderland.blogspot.com>.

7. "How Much Does Identity Theft Cost - Personal Story - Philadelphia Media Mom, Joey

Fortman - A Real Mom in the Media." How Much Does Identity Theft Cost. 29 Jan. 2011.

Web. 26 Apr. 2012. <http://www.joeyfortman.com/journal/2011/1/29/how-much-

does-identity-theft-cost-personal-story.html>.

8. "Norton 360 (Version 4.0) Screen Shots:." Norton 360 Version 4.0 Screenshots. Web. 15

Mar. 2012. <http://www.antivirusware.com/norton-360/screenshots/>.

Page 8: Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate), wormscsc.csudh.edu/cae/wp-content/uploads/sites/2/2013/11/... · 2015-03-10 · Fig. 3-8 ^Worm Virus Below

Beas 32

9. "PhishTank | Join the Fight against Phishing." PhishTank. Web. 25 Mar. 2012.

<http://www.phishtank.com>.

10. "Who Music Theft Hurts." Http://www.riaa.com. Web. 19 Apr. 2012.

<http://www.riaa.com/physicalpiracy.php?content_selector=piracy_details_online>.

11. Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the

Internet. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. Print.

12. EO. "My PC Has a Virus, Now What?" ERDAL OZKAYA. 24 Feb. 2012. Web. 07 Apr. 2012.

<http://www.erdalozkaya.com/post/2012/02/24/My-PC-has-a-virus-now-what-.aspx>.

13. Fites, Philip E., Johnston, Peter, and Kratz, Martin. The Computer Virus

Crisis.VanNostrand Reinhold/ New York, 1989.

14. Grabosky, Peter N. Crime in the Digital Age. Transaction Publishers/ The Federation

Press, 1998.

15. Graham, Cluley. "The Friday the 13th Virus." Naked Security. 13 Aug. 2010. Web. 31

Mar. 2012. <http://nakedsecurity.sophos.com/2010/08/13/friday-13th-virus/>.

16. Hinduja, Sameer. Music Piracy and Crime Theory. New York, NY, USA: LFB Scholarly

Publishing LLC, 2005. p 13. http://site.ebrary.com/lib/csudh/Doc?id=10159254&ppg=25

17. Hinduja, Sameer. Music Piracy and Crime Theory. New York, NY, USA: LFB Scholarly

Publishing LLC, 2005. p 22. http://site.ebrary.com/lib/csudh/Doc?id=10159254&ppg=34

18. Hinduja, Sameer. Music Piracy and Crime Theory. New York, NY, USA: LFB Scholarly

Publishing LLC, 2005. p 23. http://site.ebrary.com/lib/csudh/Doc?id=10159254&ppg=35

19. Hinduja, Sameer. Music Piracy and Crime Theory. New York, NY, USA: LFB Scholarly

Publishing LLC, 2005. p 25. http://site.ebrary.com/lib/csudh/Doc?id=10159254&ppg=37

Page 9: Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate), wormscsc.csudh.edu/cae/wp-content/uploads/sites/2/2013/11/... · 2015-03-10 · Fig. 3-8 ^Worm Virus Below

Beas 33

20. Hinduja, Sameer. Music Piracy and Crime Theory. New York, NY, USA: LFB Scholarly

Publishing LLC, 2005. p 34. http://site.ebrary.com/lib/csudh/Doc?id=10159254&ppg=46

21. Hinduja, Sameer. Music Piracy and Crime Theory. New York, NY, USA: LFB Scholarly

Publishing LLC, 2005. p 35. http://site.ebrary.com/lib/csudh/Doc?id=10159254&ppg=47

22. Hinduja, Sameer. Music Piracy and Crime Theory. New York, NY, USA: LFB Scholarly

Publishing LLC, 2005. p 35. http://site.ebrary.com/lib/csudh/Doc?id=10159254&ppg=47

23. Hinduja, Sameer. Music Piracy and Crime Theory. New York, NY, USA: LFB Scholarly

Publishing LLC, 2005. p 37. http://site.ebrary.com/lib/csudh/Doc?id=10159254&ppg=49

24. Hruska, Jan. Computer Viruses and Anti-Virus Walfare. Ellis Horwood, 1990.

25. Hypponen, Mikko. "Future of Cybercrime: Three Types of Online Attacks Are Explained

by Expert Mikko Hypponen." FUTUREPREDICTIONS.COM Source of Likely and Preferable

Futures. 21 Jan. 2012. Web. 29 Mar. 2012. <http://futurepredictions.com>.

26. Liane, Cassavoy. "Viruses Target IM." PCWorld. PCW Print, 4 May 2004. Web. 15 Apr.

2012. <http://www.pcworld.com/article/115837/viruses_target_im.html>.

27. Mirkovic, Jelena. Internet Denial of Service: Attack and Defense Mechanisms. Upper

Saddle River, NJ: Prentice Hall Professional Technical Reference, 2005. Print.

28. Moore, Adam D. Intellectual Property& Information Control. Transaction Publishers/

New Brunswick (U.S.A.) and London (U.K.), 2001.

29. Paul, Sara R. "- Identity Theft: Outline of Federal Statutes and Bibliography of Select

Resources." Features. 17 Nov. 2006. Web. 9 Apr. 2012.

<http://www.llrx.com/features/idtheftguide.htm>.

Page 10: Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate), wormscsc.csudh.edu/cae/wp-content/uploads/sites/2/2013/11/... · 2015-03-10 · Fig. 3-8 ^Worm Virus Below

Beas 34

30. Smail, Mark. "Data Encryption Tool Maker: Antivirus Has Become Ineffective."

BetaNews. TechNewsWorld, 2010. Web. 03 Mar. 2012.

<http://betanews.com/2010/01/22/data-encryption-tool-maker-antivirus-has-become-

ineffective/>.

31. Threats and Defense Mechanisms. Australia: Course Technology Cengage Learning,

2010. Print.

Page 11: Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate), wormscsc.csudh.edu/cae/wp-content/uploads/sites/2/2013/11/... · 2015-03-10 · Fig. 3-8 ^Worm Virus Below

Beas 35

5 APPENDIX

Cybercrimes are defined as “an umbrella term that covers both the Internet

crime and intellectual crime. In other words, cybercrimes are those crimes that can be

done with or without the help of the Internet.” Some examples of cybercrimes include

internet scams, hacking, viruses, child pornography, piracy of movies and music file

sharing, internet fraud, identity theft, denial of service attack, etc. I will focus my paper

on the three crimes: music piracy, identity theft, and computer viruses. I will define the

three types of common crimes listed above, legal consequences, real life scenarios,

preventative measures that are currently enforced, and also some controversy

surrounding these issues. In this paper, I will discuss the different types of security

measures used to prevent and enforce the current laws. However, the frequency of

these crimes comes to show us that these measures do not withstand the speed that

the criminals are moving in to counter the preventative measures. I will use current

laws as resources and evidence, but also incorporate my own suggestions and

recommendations to these topics.

Page 12: Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate), wormscsc.csudh.edu/cae/wp-content/uploads/sites/2/2013/11/... · 2015-03-10 · Fig. 3-8 ^Worm Virus Below

Beas 36

Page 13: Fig. 3-8 Worm Virus Below [26] (which need a carrier in order to replicate), wormscsc.csudh.edu/cae/wp-content/uploads/sites/2/2013/11/... · 2015-03-10 · Fig. 3-8 ^Worm Virus Below

Beas 37