SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Discuss similarities and differences between worms, viruses, and Trojan
horses.
Final Project3 Threat Factors—Computers as TargetsLearning ObjectivesDifferentiate
between viruses, worms, and Trojan horses.Explain the threat viruses pose to computers
and computer users.Explain the threat worms pose to computers and computer
users.Explain the threat Trojan horses pose to computers and computer users.Describe
countermeasures to threats that target computers and mobile devices.Cyberattacks are
cheap and unconstrained by geography and distance to the target. Let’s compare a bank
robbery with the ransomware attack on a bank. The goal of the attackers is the same: get
money from the bank and get away without leaving evidence. A bank robber has to stake
out the bank, learn about the employees’ behavior, learn about when money is taken to the
bank and picked up from the bank, and whether the bank has a security guard—and if so,
what the routine of the guard is. A bank robber often also needs an accomplice to stay
outside and check for police and/or drive the getaway car. The bank robber then has to plan
the attack, carry it out without any incidents, and get away with the money. The bank
robber has to stack the money in a safe but accessible place. The robber eventually starts
spending the money. Very often, banks now have money that is marked, which would make
it easier to catch the bank robber. The whole process is very time consuming and risky.
Bank robbery is a serious felony, and police will spend significant resources to catch the
criminal.Now compare the bank robbery with a ransomware attack on a bank. The attacker
does not need help from others. All that is needed is a computer and network connection.
The cyberthief hacks into the bank and encrypts the data. The bank now cannot operate its
business because they can’t access their data, including customer accounts. The cyberthief
sends a message to the bank manger telling him or her that if the bank wants their data
decrypted they must pay a ransom of $100,000 in bitcoins (a digital currency untraceable
by law enforcement). If the bank refuses to pay, the data will stay encrypted. Typically, the
cyberthief sets a deadline to put pressure on the victim. The bank can try to decrypt their
own data by hiring experts or with the help of law enforcement, but that may not be
possible. The cyberthief simply has to wait. He or she does not have to be physically present
or even near the bank and could be in a different country. There is also little risk of
detection because there are usually no traces. Attribution of the attack—that is, finding the
person who committed the attack—is very difficult and even in major attacks often not
possible with certainty. For instance, even though the U.S. government believes that Russia
hacked the Democratic Party during the 2016 election campaign and possibly interfered
with the election, there is no hard evidence linking Russia to the security breaches. Thus, in
a ransomware attack it is highly unlikely that the attacker will get caught. These differences
between a traditional bank robbery and a cyberattack on a bank demonstrate why
cybercrime has drastically increased and will likely continue to increase. They also
demonstrate the difficulty cybersecurity specialists in the government and private industry
face when dealing with cybercrime.Case Study 3.1: The Top 10 Data Breaches1Yahoo—
2014The hackers stole information from 500 million account holders.FriendFinder
Network—2016FriendFinder is the mother company of about 49,000 dating websites. In
2016, data from 412 million users was breached going back as far as 20 years.MySpace—
2016The company “lost” 360 million user passwords.Experian—2012More than 200
million Social Security numbers were breached after the credit reporting company acquired
the data firm Court Ventures.USA Voter Database—2015Voter information from 191
million people dating back to 1990 was stolen.LinkedIn—2012In 2016, LinkedIn admitted
that 165 million accounts had been breached.Nasdaq Stock Exchange—2012Attackers stole
more than 160 million credit and debit card numbers.eBay—2014Fraudsters gained access
to 145 million user accounts.Heartland Payment System—2009Magnetic strip information
from 100 million credit cards was stolen.VK—2016The Russian version of Facebook was
breached and 100 million accounts were breached.What Do You Think?Think about what
user information each of these companies hold. What are the negative consequences for the
victims of the data breach for the different companies?The Evolution of CybercrimePhases
of ConvergenceThere are three phases of convergence in the evolution of cybercrime. In
Phase 1 of convergence, technology is separate from people. It’s also referred to
as sneakerware because people had to physically take a floppy disk or other external hard
drive and walk to a computer to transfer a malware onto the computer. The first Macintosh
virus, Elk Cloner, was part of a video game for computers inserted via a floppy disk.In Phase
2 of convergence, man is leveraging technology—that is, man is using technology. In this
phase, fraudsters developed the first e-mail-born viruses, such as the ILOVEYOU and the
Melissa virus, which spread via e-mail attachment. Everyone who opened the attachment
infected their computer.In Phase 3 of convergence, technology replaces people. The first
malware that fell into this phase was Code Red discovered in 2001. Code Red attacked
Microsoft computer systems and spread to other systems by using HTTP requests. The Code
Red worm does not respond to the owner’s commands, but rather it operates independently
by creating a backdoor into the operating system of the computer. The computer owner
does not know what the worm will do with the computer. The original Code Red initiated a
denial-of-service (DoS) attack on the White House. All machines infected with the Code Red
virus started to send requests to the White House web server at the same time,
overwhelming the server. People who had computers infected with Code Red not only had
an infected machine but they were potentially also suspected of committing a crime (i.e., the
DoS attack) on the White House.2Phase 3 of convergence was also the beginning of the era
of cyberspying. People do not have to be physically present in one country to spy out
information on computers in another country; instead, they can infiltrate computers and
steal information by using computer programs such as Trojan horses. This chapter
discusses viruses, worms, and Trojan horses in detail and provides examples for
each.Reference Report: CIA Report on Russian Hacking of Democratic
Partyhttps://www.intelligence.senategov/sites/default/files/documents/ICA_2017_01.pdf
Main Targets in Information TechnologyCybercrimes are a growing problem in need of new
solutions. A whopping 74% of businesses are expected to be successfully hacked in 2017. By
2020, the economic cost of cybercrime is expected to go above $3 trillion. Increasingly,
nation-states are committing the attacks, which results in more sophisticated attacks and
attacks on important infrastructures.6 There are three main targets in information
technology: software, hardware, and the network. Table 3.1 provides some examples of the
vulnerabilities of software, hardware, and networks. Throughout this book we explain these
vulnerabilities and countermeasures in detail.

Weitere ähnliche Inhalte

Ähnlich wie Discuss similarities and differences between and Trojan.docx

A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
NAGTRI Journal Article
NAGTRI Journal ArticleNAGTRI Journal Article
NAGTRI Journal ArticleTaylre Janak
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Internet
InternetInternet
InternetJodip
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxThe Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxjiyalouis
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 

Ähnlich wie Discuss similarities and differences between and Trojan.docx (20)

A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
NAGTRI Journal Article
NAGTRI Journal ArticleNAGTRI Journal Article
NAGTRI Journal Article
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Internet
InternetInternet
Internet
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxThe Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 

Mehr von bkbk37

Range of.docx
Range of.docxRange of.docx
Range of.docxbkbk37
 
Ralph Waldo Emerson.docx
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docxbkbk37
 
Raising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxbkbk37
 
Rail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxbkbk37
 
Racism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxbkbk37
 
Race and.docx
Race and.docxRace and.docx
Race and.docxbkbk37
 
R2P and Syria.docx
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docxbkbk37
 
Racial Disparities.docx
Racial Disparities.docxRacial Disparities.docx
Racial Disparities.docxbkbk37
 
Race and Technology.docx
Race and Technology.docxRace and Technology.docx
Race and Technology.docxbkbk37
 
QuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxQuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxbkbk37
 
Questions What are the purposes of Just.docx
Questions What are the purposes of Just.docxQuestions What are the purposes of Just.docx
Questions What are the purposes of Just.docxbkbk37
 
Questions to Each group you read about is.docx
Questions to Each group you read about is.docxQuestions to Each group you read about is.docx
Questions to Each group you read about is.docxbkbk37
 
Questions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxQuestions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxbkbk37
 
Questions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxQuestions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxbkbk37
 
Question Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxQuestion Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxbkbk37
 
Question Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxQuestion Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxbkbk37
 
Question Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxQuestion Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxbkbk37
 
Question share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxQuestion share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxbkbk37
 
QEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxQEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxbkbk37
 
Question In your what are the main workforce.docx
Question In your what are the main workforce.docxQuestion In your what are the main workforce.docx
Question In your what are the main workforce.docxbkbk37
 

Mehr von bkbk37 (20)

Range of.docx
Range of.docxRange of.docx
Range of.docx
 
Ralph Waldo Emerson.docx
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docx
 
Raising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docx
 
Rail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docx
 
Racism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docx
 
Race and.docx
Race and.docxRace and.docx
Race and.docx
 
R2P and Syria.docx
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docx
 
Racial Disparities.docx
Racial Disparities.docxRacial Disparities.docx
Racial Disparities.docx
 
Race and Technology.docx
Race and Technology.docxRace and Technology.docx
Race and Technology.docx
 
QuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxQuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docx
 
Questions What are the purposes of Just.docx
Questions What are the purposes of Just.docxQuestions What are the purposes of Just.docx
Questions What are the purposes of Just.docx
 
Questions to Each group you read about is.docx
Questions to Each group you read about is.docxQuestions to Each group you read about is.docx
Questions to Each group you read about is.docx
 
Questions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxQuestions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docx
 
Questions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxQuestions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docx
 
Question Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxQuestion Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docx
 
Question Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxQuestion Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docx
 
Question Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxQuestion Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docx
 
Question share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxQuestion share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docx
 
QEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxQEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docx
 
Question In your what are the main workforce.docx
Question In your what are the main workforce.docxQuestion In your what are the main workforce.docx
Question In your what are the main workforce.docx
 

Kürzlich hochgeladen

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Kürzlich hochgeladen (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Discuss similarities and differences between and Trojan.docx

  • 1. Discuss similarities and differences between worms, viruses, and Trojan horses. Final Project3 Threat Factors—Computers as TargetsLearning ObjectivesDifferentiate between viruses, worms, and Trojan horses.Explain the threat viruses pose to computers and computer users.Explain the threat worms pose to computers and computer users.Explain the threat Trojan horses pose to computers and computer users.Describe countermeasures to threats that target computers and mobile devices.Cyberattacks are cheap and unconstrained by geography and distance to the target. Let’s compare a bank robbery with the ransomware attack on a bank. The goal of the attackers is the same: get money from the bank and get away without leaving evidence. A bank robber has to stake out the bank, learn about the employees’ behavior, learn about when money is taken to the bank and picked up from the bank, and whether the bank has a security guard—and if so, what the routine of the guard is. A bank robber often also needs an accomplice to stay outside and check for police and/or drive the getaway car. The bank robber then has to plan the attack, carry it out without any incidents, and get away with the money. The bank robber has to stack the money in a safe but accessible place. The robber eventually starts spending the money. Very often, banks now have money that is marked, which would make it easier to catch the bank robber. The whole process is very time consuming and risky. Bank robbery is a serious felony, and police will spend significant resources to catch the criminal.Now compare the bank robbery with a ransomware attack on a bank. The attacker does not need help from others. All that is needed is a computer and network connection. The cyberthief hacks into the bank and encrypts the data. The bank now cannot operate its business because they can’t access their data, including customer accounts. The cyberthief sends a message to the bank manger telling him or her that if the bank wants their data decrypted they must pay a ransom of $100,000 in bitcoins (a digital currency untraceable by law enforcement). If the bank refuses to pay, the data will stay encrypted. Typically, the cyberthief sets a deadline to put pressure on the victim. The bank can try to decrypt their own data by hiring experts or with the help of law enforcement, but that may not be possible. The cyberthief simply has to wait. He or she does not have to be physically present or even near the bank and could be in a different country. There is also little risk of detection because there are usually no traces. Attribution of the attack—that is, finding the person who committed the attack—is very difficult and even in major attacks often not possible with certainty. For instance, even though the U.S. government believes that Russia
  • 2. hacked the Democratic Party during the 2016 election campaign and possibly interfered with the election, there is no hard evidence linking Russia to the security breaches. Thus, in a ransomware attack it is highly unlikely that the attacker will get caught. These differences between a traditional bank robbery and a cyberattack on a bank demonstrate why cybercrime has drastically increased and will likely continue to increase. They also demonstrate the difficulty cybersecurity specialists in the government and private industry face when dealing with cybercrime.Case Study 3.1: The Top 10 Data Breaches1Yahoo— 2014The hackers stole information from 500 million account holders.FriendFinder Network—2016FriendFinder is the mother company of about 49,000 dating websites. In 2016, data from 412 million users was breached going back as far as 20 years.MySpace— 2016The company “lost” 360 million user passwords.Experian—2012More than 200 million Social Security numbers were breached after the credit reporting company acquired the data firm Court Ventures.USA Voter Database—2015Voter information from 191 million people dating back to 1990 was stolen.LinkedIn—2012In 2016, LinkedIn admitted that 165 million accounts had been breached.Nasdaq Stock Exchange—2012Attackers stole more than 160 million credit and debit card numbers.eBay—2014Fraudsters gained access to 145 million user accounts.Heartland Payment System—2009Magnetic strip information from 100 million credit cards was stolen.VK—2016The Russian version of Facebook was breached and 100 million accounts were breached.What Do You Think?Think about what user information each of these companies hold. What are the negative consequences for the victims of the data breach for the different companies?The Evolution of CybercrimePhases of ConvergenceThere are three phases of convergence in the evolution of cybercrime. In Phase 1 of convergence, technology is separate from people. It’s also referred to as sneakerware because people had to physically take a floppy disk or other external hard drive and walk to a computer to transfer a malware onto the computer. The first Macintosh virus, Elk Cloner, was part of a video game for computers inserted via a floppy disk.In Phase 2 of convergence, man is leveraging technology—that is, man is using technology. In this phase, fraudsters developed the first e-mail-born viruses, such as the ILOVEYOU and the Melissa virus, which spread via e-mail attachment. Everyone who opened the attachment infected their computer.In Phase 3 of convergence, technology replaces people. The first malware that fell into this phase was Code Red discovered in 2001. Code Red attacked Microsoft computer systems and spread to other systems by using HTTP requests. The Code Red worm does not respond to the owner’s commands, but rather it operates independently by creating a backdoor into the operating system of the computer. The computer owner does not know what the worm will do with the computer. The original Code Red initiated a denial-of-service (DoS) attack on the White House. All machines infected with the Code Red virus started to send requests to the White House web server at the same time, overwhelming the server. People who had computers infected with Code Red not only had an infected machine but they were potentially also suspected of committing a crime (i.e., the DoS attack) on the White House.2Phase 3 of convergence was also the beginning of the era of cyberspying. People do not have to be physically present in one country to spy out information on computers in another country; instead, they can infiltrate computers and steal information by using computer programs such as Trojan horses. This chapter
  • 3. discusses viruses, worms, and Trojan horses in detail and provides examples for each.Reference Report: CIA Report on Russian Hacking of Democratic Partyhttps://www.intelligence.senategov/sites/default/files/documents/ICA_2017_01.pdf Main Targets in Information TechnologyCybercrimes are a growing problem in need of new solutions. A whopping 74% of businesses are expected to be successfully hacked in 2017. By 2020, the economic cost of cybercrime is expected to go above $3 trillion. Increasingly, nation-states are committing the attacks, which results in more sophisticated attacks and attacks on important infrastructures.6 There are three main targets in information technology: software, hardware, and the network. Table 3.1 provides some examples of the vulnerabilities of software, hardware, and networks. Throughout this book we explain these vulnerabilities and countermeasures in detail.