SlideShare ist ein Scribd-Unternehmen logo
1 von 19
By: Reshma M R
Mannam Foundation Centre for
Education Technology
Social Science
Reg No: 16915373009
 Short for “malicious software.”
 Designed to infiltrate a system
without owner’s consent.
 General term that defines a variety of
hostile, intrusive, or annoying
program code.
 Creator’s perceived intent
defines software as malware.
 A 2008 report released by Symantec suggested:
 Releases of malicious code may be exceeding rates of
legitimate software applications.
 Primarily released through the Internet.
 Email
 Web sites
 Shaoxing, China was named the malware
capital of the world by Symantec in 2010.
 Early malware, including worms & viruses
were written as pranks.
 Today, most malware possesses intent to
destroy systems including:
 Files
 Web pages
 Estimated that about 1 in 10 web pages contain
malicious code.
 Many others create “zombie computers” that
aid in advertising for profit motive.
 Tells infected computers to send spam email.
 Spyware is a form of malware.
 It monitor’s web browsing & displays unsolicited
advertisements.
 Do not spread like viruses.
 Simply exploit security holes
 Basis of laws against malware include:
 Hacking
 Copyright Infringement
 Child Porn
 Privacy
 Fraud
 Destruction of property (Denial-of-Service attacks)
 Harassment
 Identity theft
 The basis for cybercrime laws is large in scope.
 As endless as non-cyber crime laws.
 U.S. laws continually get passed at the state &
Federal levels of government.
 Protect users of the web.
 Civil and criminal means of prosecution
 Example:
http://www.informationweek.com/news/security/
cybercrime/showArticle.jhtml?articleID=210602182
 US cybercrime laws are catching up.
 Some that help to combat malware are not as archaic.
 However, there are still hurdles when the courts are
out touch with reality.
 Example: Virginia anti-spam law struck down by the
state’s Supreme Court
oSaid it violated 1st
Amendment right to freedom of speech.
ohttp://www.cybercrimelaw.org/2008/09/12/virginia-
supreme-court-strikes-down-states-anti-spam-law/
 Technology is constantly changing.
 Creates concern that at any given time, cybercrime
legislation falls out of date.
 Large amounts of malware originate in foreign
countries.
 Extradition laws not always up-to-date.
 New treaties help to combat problems.
 http://www.arnnet.com.au/article/345145/efa_cyberc
rime_treaty_will_trigger_tougher_laws/
 Google said malicious
software has been used to spy
on Vietnamese computers
 The malware targeted tens of
thousands of people.
 The malware has been used
to attack blogs containing
messages of political dissent.
 Security Issues
 The prevalence of broadband internet has allowed for a
wave of malware solely intended to reap benefits.
 Downloading programs & sharing software has
created opportunities for malware
 Use of a standard password for access control
can create vulnerabilities
 A large percentage of users do not change their
passwords from that established by the manufacturer
causing the passwords to be easily obtainable
 Public access points, such as airports & coffee
shops, offer little or no security.
 Penalties are depend on the level of severity of the
attack.
 In some cases, credit & debit card data is stolen; this
level of mayhem constitutes malware fraud felony, which
can lead the perpetrators to serve numerous years in
prison as well as pay enormous fines.
 If a site has links to malware sites, then the link is
removed from their name in the SERPs (search engine
results pages).
 This feature is designed so that the site owners become
aware of the malware issue.
 Google Penalty Types
 There are various penalty types that have been found
as follows;
I. The “Minus Thirty” Penalty
II. The “950 Penalty”
III. The Position 6 Penalty
 A Google penalty is a punishment Google gives to sites
they feel do not meet certain quality standards.
 This can spell disaster for companies who run their
business through their web sites.
 Very difficult to identify the criminals who spy on
Vietnamese’s websites as the other side are Chinese
government.
 Using Malware for damaging
purposes:
 To attack blogs containing messages of
political dissent. (Invasion of Privacy)
 Vietnam is lack of laws & investigators with the requisite
experience or even the equipment to collect evidence to
fight cyber crime which include malware through google.
Compromising Confidentiality: 18 U.S.C. § 1030(a)(2)
(c)
 Intentionally access a computer
 without or in excess of authorization
Penalties:
 Violations of section 1030(a)(2) are misdemeanors punishable by a fine
or a one-year prison term, unless aggravating factors apply.
 A violation or attempted violation of section 1030(a)(2) is a felony if:
 committed for commercial advantage or private financial gain,
 committed in furtherance of any criminal or tortuous act in violation of the
Constitution or laws of the United States or of any State, or
 the value of the information obtained exceeds $5,000.
 Historical Data: Computer crime cost Vietnam US$1.76 billion
in 2008
 Vietnam should have security systems& computer crime
laws as fast as possible by using the U.S. laws as a
benchmarking.
 With penalties, cyber crime might be reduce.
Source:http://www.straitstimes.com/Breaking%2BNews/SE%2BAsia/Story/STIStory_354440.html
 Must be aware at all times of potential attacks.
 Must make employees aware of the dangers of
malware.
 Must take preventive measures against
malware attacks.
 Must be aware of the legal & reporting
measures to stop the spread of malware.
Malware

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismGanesh DNP
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurVaibhav's Group
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009Symantec
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
Introduction to malvertising
Introduction to malvertising Introduction to malvertising
Introduction to malvertising Mohd Arif
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersUnited Security Providers AG
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
Cyber modified
Cyber modifiedCyber modified
Cyber modifiedvjom
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhandenullowaspmumbai
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastMohamed N. El-Guindy
 

Was ist angesagt? (19)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
Ransomware
RansomwareRansomware
Ransomware
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Introduction to malvertising
Introduction to malvertising Introduction to malvertising
Introduction to malvertising
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security Providers
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Copyright Ingringement
Copyright IngringementCopyright Ingringement
Copyright Ingringement
 
CIO Vietnam Talkshow 40th
CIO Vietnam Talkshow 40thCIO Vietnam Talkshow 40th
CIO Vietnam Talkshow 40th
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhande
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
 

Andere mochten auch

Digital Etiquette vhardy
Digital Etiquette  vhardyDigital Etiquette  vhardy
Digital Etiquette vhardyVanessa Hardy
 
Being Smart In Cyber Space
Being Smart In Cyber SpaceBeing Smart In Cyber Space
Being Smart In Cyber Spacekirahlee
 
Computer&Internet Safety Digital Story
Computer&Internet Safety Digital StoryComputer&Internet Safety Digital Story
Computer&Internet Safety Digital StorySandra Sammarco
 
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe OnlineCyber Crime: Stay Safe Online
Cyber Crime: Stay Safe OnlineSalshaza Putera
 
Big data ... for security
Big data ... for securityBig data ... for security
Big data ... for securityJames Salter
 
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersHack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersLife Cycle Engineering
 
SECQME Watch Over Me Deck 2014
SECQME Watch Over Me Deck 2014SECQME Watch Over Me Deck 2014
SECQME Watch Over Me Deck 2014Khoo Shiang
 
Big data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesBig data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesKapil Mehrotra
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting Sina Manavi
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testingSanthosh Kumar
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 

Andere mochten auch (20)

Digital Etiquette vhardy
Digital Etiquette  vhardyDigital Etiquette  vhardy
Digital Etiquette vhardy
 
Being Smart In Cyber Space
Being Smart In Cyber SpaceBeing Smart In Cyber Space
Being Smart In Cyber Space
 
Computer&Internet Safety Digital Story
Computer&Internet Safety Digital StoryComputer&Internet Safety Digital Story
Computer&Internet Safety Digital Story
 
Stay safe online
Stay safe onlineStay safe online
Stay safe online
 
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe OnlineCyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
 
Big data ... for security
Big data ... for securityBig data ... for security
Big data ... for security
 
Mobile phone Data Hacking
Mobile phone Data HackingMobile phone Data Hacking
Mobile phone Data Hacking
 
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersHack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
 
SECQME Watch Over Me Deck 2014
SECQME Watch Over Me Deck 2014SECQME Watch Over Me Deck 2014
SECQME Watch Over Me Deck 2014
 
Big data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesBig data and cyber security legal risks and challenges
Big data and cyber security legal risks and challenges
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 

Ähnlich wie Malware

A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Computer and internet crime.pptx
Computer and internet crime.pptxComputer and internet crime.pptx
Computer and internet crime.pptxGeromePantalonia
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd Iaetsd
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 

Ähnlich wie Malware (20)

A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Computer and internet crime.pptx
Computer and internet crime.pptxComputer and internet crime.pptx
Computer and internet crime.pptx
 
Computer crime
 Computer crime Computer crime
Computer crime
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Hamza
HamzaHamza
Hamza
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
Essay On Piracy
Essay On PiracyEssay On Piracy
Essay On Piracy
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
English in written
English in writtenEnglish in written
English in written
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 

Mehr von galaxy201 (20)

Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
teaching practice
teaching practiceteaching practice
teaching practice
 
Output
OutputOutput
Output
 
Digestive system ppt
Digestive system pptDigestive system ppt
Digestive system ppt
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
New doc 2017 02-11
New doc 2017 02-11New doc 2017 02-11
New doc 2017 02-11
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 

Kürzlich hochgeladen

IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Kürzlich hochgeladen (20)

IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

Malware

  • 1. By: Reshma M R Mannam Foundation Centre for Education Technology Social Science Reg No: 16915373009
  • 2.  Short for “malicious software.”  Designed to infiltrate a system without owner’s consent.  General term that defines a variety of hostile, intrusive, or annoying program code.  Creator’s perceived intent defines software as malware.
  • 3.  A 2008 report released by Symantec suggested:  Releases of malicious code may be exceeding rates of legitimate software applications.  Primarily released through the Internet.  Email  Web sites  Shaoxing, China was named the malware capital of the world by Symantec in 2010.
  • 4.  Early malware, including worms & viruses were written as pranks.  Today, most malware possesses intent to destroy systems including:  Files  Web pages  Estimated that about 1 in 10 web pages contain malicious code.
  • 5.  Many others create “zombie computers” that aid in advertising for profit motive.  Tells infected computers to send spam email.  Spyware is a form of malware.  It monitor’s web browsing & displays unsolicited advertisements.  Do not spread like viruses.  Simply exploit security holes
  • 6.  Basis of laws against malware include:  Hacking  Copyright Infringement  Child Porn  Privacy  Fraud  Destruction of property (Denial-of-Service attacks)  Harassment  Identity theft
  • 7.  The basis for cybercrime laws is large in scope.  As endless as non-cyber crime laws.  U.S. laws continually get passed at the state & Federal levels of government.  Protect users of the web.  Civil and criminal means of prosecution  Example: http://www.informationweek.com/news/security/ cybercrime/showArticle.jhtml?articleID=210602182
  • 8.  US cybercrime laws are catching up.  Some that help to combat malware are not as archaic.  However, there are still hurdles when the courts are out touch with reality.  Example: Virginia anti-spam law struck down by the state’s Supreme Court oSaid it violated 1st Amendment right to freedom of speech. ohttp://www.cybercrimelaw.org/2008/09/12/virginia- supreme-court-strikes-down-states-anti-spam-law/
  • 9.  Technology is constantly changing.  Creates concern that at any given time, cybercrime legislation falls out of date.  Large amounts of malware originate in foreign countries.  Extradition laws not always up-to-date.  New treaties help to combat problems.  http://www.arnnet.com.au/article/345145/efa_cyberc rime_treaty_will_trigger_tougher_laws/
  • 10.  Google said malicious software has been used to spy on Vietnamese computers  The malware targeted tens of thousands of people.  The malware has been used to attack blogs containing messages of political dissent.
  • 11.  Security Issues  The prevalence of broadband internet has allowed for a wave of malware solely intended to reap benefits.  Downloading programs & sharing software has created opportunities for malware
  • 12.  Use of a standard password for access control can create vulnerabilities  A large percentage of users do not change their passwords from that established by the manufacturer causing the passwords to be easily obtainable  Public access points, such as airports & coffee shops, offer little or no security.
  • 13.  Penalties are depend on the level of severity of the attack.  In some cases, credit & debit card data is stolen; this level of mayhem constitutes malware fraud felony, which can lead the perpetrators to serve numerous years in prison as well as pay enormous fines.  If a site has links to malware sites, then the link is removed from their name in the SERPs (search engine results pages).  This feature is designed so that the site owners become aware of the malware issue.
  • 14.  Google Penalty Types  There are various penalty types that have been found as follows; I. The “Minus Thirty” Penalty II. The “950 Penalty” III. The Position 6 Penalty  A Google penalty is a punishment Google gives to sites they feel do not meet certain quality standards.  This can spell disaster for companies who run their business through their web sites.
  • 15.  Very difficult to identify the criminals who spy on Vietnamese’s websites as the other side are Chinese government.  Using Malware for damaging purposes:  To attack blogs containing messages of political dissent. (Invasion of Privacy)  Vietnam is lack of laws & investigators with the requisite experience or even the equipment to collect evidence to fight cyber crime which include malware through google.
  • 16. Compromising Confidentiality: 18 U.S.C. § 1030(a)(2) (c)  Intentionally access a computer  without or in excess of authorization Penalties:  Violations of section 1030(a)(2) are misdemeanors punishable by a fine or a one-year prison term, unless aggravating factors apply.  A violation or attempted violation of section 1030(a)(2) is a felony if:  committed for commercial advantage or private financial gain,  committed in furtherance of any criminal or tortuous act in violation of the Constitution or laws of the United States or of any State, or  the value of the information obtained exceeds $5,000.
  • 17.  Historical Data: Computer crime cost Vietnam US$1.76 billion in 2008  Vietnam should have security systems& computer crime laws as fast as possible by using the U.S. laws as a benchmarking.  With penalties, cyber crime might be reduce. Source:http://www.straitstimes.com/Breaking%2BNews/SE%2BAsia/Story/STIStory_354440.html
  • 18.  Must be aware at all times of potential attacks.  Must make employees aware of the dangers of malware.  Must take preventive measures against malware attacks.  Must be aware of the legal & reporting measures to stop the spread of malware.