Types of cybercrime
unauthorized access: Unlawful use of passwords and the entry of a computer system without authorization from the owner. (Violation of privacy).
Data destruction: Damage caused to the network through the introduction of viruses, logic bombs, etc.
Violation database copy: Unauthorized use of information stored in a database.
Interception of e-mail: Reading an e-mail others.
Transfer of funds: Deceptions in the conduct of such transactions.
Espionage: Unauthorized access to computer systems of government and big business and interception of emails.
Terrorism: anonymous posts used by groups.
Traffic computer key obtained by unlawful means.
Unauthorized reproduction of software protected.
Characteristics, techniques and ways to combat computer fraud
• There are many cases and few complaints, and all because the same lack of regulation by law.
• Are occupational activities, as is often done when the subject is working?
• Are actions of chance, in that it takes an occasion created or highly intensified in the world of functions and organization of technological and economic system?
• They cause serious economic losses, as almost always produce "profits of more than five figures to those who perform them.
• Provide time and space facilities, as in a split second and without a physical presence needed can consume.
• Most are negligent and do not necessarily committed with intent.
• Provide facilities for their commitment to the mentoring of age.
• They tend to grow more and more, thus requiring an urgent regulation.
• For the time being remain unpunished manifestly illegal under the law.
• Are criminogenic behaviors, while only a certain number of people with certain skills (technical here) can be committed.
• keep the network locked with a security code
• always leave the team with only trusted users
Measures to prevent frauds
• Make a backup or Backus: It is important that you periodically back up. You can do it manually, saving data to removable media or with programs created to make backups.
• Avoid giving information dare e-mail, telephone, never fill out forms arrive blank e-mail dare.
• Passwords not easily decipher is important that the password contains uppercase and lowercase letters and numbers. Never send passwords by e-mail, IM, chats, etc.Do not use the same password for all services and change the password periodically.
• Enable MAC distinguishing number that does not belong to the computer, but the device connected to the network, called the MAC number. It is therefore possible to enable a filter to only connect to our network devices with a MAC number.
• Typical applications are not personalized phishing. Unlike your bank or company that issued your credit card, which may include your name and / or an identifier or type of account, requests for phishing usually keep the health and information about you in a generic way .
• Be suspicious of numeric web addresses or URLs. In general, the Web address or URL of a company includes part of the company name followed by. Com,. Org or. Net. A fake Web site that uses a Web address (or IP address) that contains a numeric or symbol "@" in the address can be a warning that it is a fraudulent site
• Get to know the websites you visit frequently and mark them as favorites.
• Learn about Internet scams. Keep abreast of the allegations of fraud, trends and examples of fraudulent e-mail messages today can help prevent becoming a victim.
What are computer viruses
Computer viruses are small software programs designed to spread from one computer to another and to interfere with the operation of equipo.Un virus can damage or delete data on your computer.
Classes of viruses and how they act
File Virus
This virus is responsible for infecting programs or executable files (files with. Exe or. Com). When running one of these programs, the virus becomes active and produces harmful effects. The majority of Existing viruses are of this type.
• Residents Virus
They stay in the RAM of the computer waiting for it to run any program they infected.RAM loses its contents when you turn off or restart the computer, therefore, some of these viruses disappear as soon as this happens, others, however, modify the system to be reinstalled every time you turn on your computer.
• Boot Virus
They affect the boot sector of the computer and are transmitted through floppy disks. They hide in the first sector of a disk and loaded into RAM. Thus take total control to hide, spread and cause damage. Usually replace the contents of the boot sector with their own content and move the original area to another area of the disk. To remove them, you need to boot the computer from an uninfected diskette and proceed to remove a virus, and if necessary replace the infected area with the original boot sector.
• Macro Virus
Are 80% of all viruses in the world. They are completely independent of the operating system. The macro-viruses are small programs written in the language of a program. So we can find macro-virus for text editors, spreadsheets and utilities that specialize in image manipulation. The macro virus infections performed on files that were created with certain applications or programs, such as text editors, database managers, spreadsheet programs, etc.This type of virus is activated when you open an infected file into the word processor or spreadsheet.
• Virus "Bug-ware"
These are programs that were not intended to be a virus, but for specific functions within the system. Bug-ware programs are not viruses at all. They are really buggy programs, but the result is similar to the virus.
• Worms
Worms are programs that replicate themselves from system to system without using a file to do so. In this they differ from viruses, which need to be extended by an infected file. A computer worm is a standalone program capable of distributing copies of itself to other computer systems (usually via network connections). Its aim is simply to self replicate and not to cause damage. Introduce garbage characters on screen, documents and work files. Exploit security holes in e-mail programs to infect computers.Do not need a separate program execution to be activated, but enter and infect the computer simply viewing an email.
Trojans (Trojan horses)
Trojans are programs that look innocent are actually harmful activity .Trojan horses contain malicious code that, when activated, causes loss or data theft. For a Trojan horse is necessary to extend leave to enter the system, such as opening an email attachment.
Attachments sent in unsolicited messages or downloaded files are likely to be Trojan horses. These viruses cause the victim of the attack run a program (virus server), which installs itself in the system waiting for the user to connect your computer to the Internet. Once connected, the client program (hacker), has all the tools needed to use the computer away from his victim, to manage part of their resources and obtain the information stored in its storage units.
Usually used for spying, using the technique to install a remote access software that enables the user to monitor what the computer does legitimate and, for example, capture keystrokes to obtain passwords or other sensitive information.
Chameleons
Chameleons can perform all the functions of the legitimate programs they replace (act as product demonstration programs, which are simulations of real programs). A chameleon software could, for example, to emulate a program to access remote systems (rlogin, telnet) performing all the actions they perform, but as an additional task (and hidden from the user) is stored in a file different logins and passwords so that later can be retrieved and used illegally by the virus writer chameleon.
Breeding rabbits
the breeding rabbits consistently reproduce once they are fully implemented, while supplies last (with offspring) disk space or memory of the system.
The sole function of this virus is to create clones and run for them to do the same. The purpose is to exhaust system resources, especially in a networked multiuser environment, to the extent that the host can’not continues normal processing.
Logic Bombs
a logic bomb is computer software that is installed on a computer and remains hidden until one or more conditions met then reprogrammed to perform an action. Unlike a virus, logic bomb never play alone. Examples of predetermined conditions are specific days of the week, specific time, pressing a key or key sequence specific. And examples of actions that may be performed: delete the hard disk information, display a message on the screen, play a song or send us an email.
Retro-virus or antivirus Virus
a retro-virus attempts to directly attack the antivirus program included in the computer.
Retroviruses generally seek virus definition file and remove it, making it impossible to identify their antivirus enemies. Other retro-virus program detected the virus in memory and try to hide or initiate a damage routine before the antiviruses manage to find. Some even change the environment so that it ends up affecting the operation of the antivirus.
Virus multipuntitos
Multipuntitos viruses attack the boot sectors and executable files. When an infected application is run with one of these viruses, it infects the boot sector. The next time you boot the computer, the virus will attack any program running.
Who created the virus
• they are created, mostly by people who want to demonstrate their computer skills, but for obvious reasons, tend to remain anonymous.
Currently, there are programs that any user, without any programming knowledge can create your own or viruses themselves, giving the name and features you want. And even there are certain websites that offer this possibility
as the virus can be prevented
• Make regular backups of our data.
• Do not accept non-genuine or pre-installed without the original media.
• write-protect disks, especially the system.
• If possible, select the hard drive as default boot in the BIOS to prevent boot sector viruses.
• Scan all new records that we introduce in our system with a virus, including blank discs (they may contain virus in boot sector).
• Review periodically the hard drive booting from the original system disk to avoid that a virus is loaded into memory prior to analysis.
• Update anti-virus patterns every one to two months.
• Try to get the program requiring official Internet sites.
• Be particularly careful with files that can be included in our email.
• Analyze and document archives also.
As viruses are detected
• to detect the presence of a computer virus can employ various types of antiviral programs. Screening programs can recognize the characteristics of the computer code of a computer virus and look for these features in computer files.
• The only programs are the checksum, calculations employing more than detect all mathematical computer virus to compare the state of the executable programs before and after running. If the checksum changes, the system is not infected.
• The integrity programs established shell layers which must pass any order of execution of a program. Inside the shell integrity is automatically performed a checksum, and if found infected programs are not allowed to run.
What are the antivirus and how they work
• Are programs whose function is to detect and eliminate computer viruses and other malware, antivirus basically a code compares each file with a database of codes (signatures or vaccines), of known viruses. So it is important to update regularly to prevent a new virus is not detected
• Monitor the computer files as they be opened or created to ensure that they are infected. This is a real-time protection, which can affect the performance of the computer



No hay comentarios:
Publicar un comentario