This report describes about the fundamentals of cybercrimes and mainly focused on the ethical hacking. It explains what constitutes a crime when using computers, how computer crimes are committed along with a broad description of ethical hacking.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:ETHICAL HACKING AS A DEFENCE MECHANISM ETHICAL HACKING AS A DEFENCE MECHANISM Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1ETHICAL HACKING AS A DEFENCE MECHANISM Table of Contents 1.0 Introduction..........................................................................................................................2 2.0 Cybercrimes:........................................................................................................................3 3.0 Crime cases:.........................................................................................................................4 4.0 Ethical hacking.....................................................................................................................5 5.0 Conclusion:..........................................................................................................................5 6.0 References:...........................................................................................................................7
2ETHICAL HACKING AS A DEFENCE MECHANISM 1.0 Introduction Computer crime, widely known as cybercrime associated with criminal activities while utilizing network devices or computers. Majority of the cybercrime is initiated to gain profit but some of them are designed to damage infected devices or compromise crucial data. Mostly, cybercrimes are associated with spreading malware and illegal content. Some of the cybercrimes involved both as Ransom ware attack, where crucial data is encrypted in the infected system and asks for ransom to access this files. Users need to pay certain amount of cryptocurrencyinordertogainingaccesstotheirfiles.Cybercrimescanalsobe distinguished into two types as computer enabled crime and computer depended crime. Computer depended crimes are offences which can only be committed while utilizing the computer devices or network or any application of information technology. This type of attacks involves spreading of malware, virus and hacking and DoS attacks. On other hand, computer enabled crimes are traditional crimes which can be improved in their reach or scale by utilizing computers, computer network or other type of information technology. Unlike cyber-dependent crimes, they can be committed without the use of ICT. Theft and fraud are the two widely listed occurrences of cyber enabled crime. This report describes about the fundamentals of cybercrimes. Cybercrime is a broad topic which cannot be described fully within such short parameter. So, it is mainly focused on the different kind of computer crimes. This paper explains what constitutes a crime when using computers, how computer crimes are committed along with a broad description of ethical hacking. The discussion is also associates with what Ethical Hacking is, what makes it a legal activity, and what it actually is about, which is a network defence mechanism. Further, a conclusion has been drawn from the discussion.
3ETHICAL HACKING AS A DEFENCE MECHANISM 2.0 Cybercrimes: Computer crimes can also be describe as a very board category of wrongdoings where some of the offenses are similar as non-computer wrongdoings such as fraud or larceny. Other cybercrimes are associates with hacking to compromise crucial information or damage targetedsystem(Shettyetal.2017).Thistypeofcrimesincludesinfiltrateofany unauthorized system while falsifying email source information, introducing a virus or other contaminant into a computer system, using a computer in a scheme to defraud, utilizing encryption in aid of a crime, using interfering with someone else's computer access or use, copying, modifying, disclosing, using, damaging or taking programs or data and improperly accessing a computer, system, or network. Cyber criminals uses several type of techniques to infect the targeted systems. Most cybercrimes are committed by small groups or individuals. However, large organizations are also involved with the criminal activities such Anonymous. Anonymous is made up of an international network of activists who purposely disrupt organizations they believe to be morally corrupt (Peacock2013). They are considered very dangerous and anonymous as they are constantly developingnew ways to infiltratecomputers or networks while taking advantages of internet. Criminal communities also share tools and strategies to infiltrate computers or networks. Different criminal uses several techniques to infiltrate computers, some of them are following: Denial-of-Service attacks– This attacks involves flooding a server or network with high traffic which crashes the system and cannot be used by the users.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4ETHICAL HACKING AS A DEFENCE MECHANISM Fast Flux- Moving data quickly among the computers in a botnet to make it difficult to trace the source of malware or phishing websites. Zombie Computer- A computer that has been hacked into and is used to launch malicious attacks or to become part of a botnet. Botnet- A type of bot which is cable of spreading malware automatically over several network. Skimmers- Devices that take credit card information when the card is swiped through them. After getting the card information of the user, the information sold online through a criminal community. SocialEngineering–Utilizingmanipulationandliestoidentifytheuser’spersonal information.
5ETHICAL HACKING AS A DEFENCE MECHANISM Figure 1: Cyber Crimes as a proportion Source:(Dayanandamet al.2013) Some of the criminal activities are targeted to certain organizations that store people’s personal information such as credit card companies. However, majority of the cyber threats target home computers as it is easier to infiltrate (Xuet al.2014). These computers are embedded with basic security measurement such as firewall and anti-viruses comparing to the large organization security measurement. 3.0 Crime cases: Several cybercrimes are noted in the past years some of them are described below. 3.1 Hackers steal £650 million from global banks, 2015 This case was happened in early 2015 when some Russian hackers managed to gain access to secure information from more than 100 institutions around the world. They utilized malware to breach such systems in order to gain access over personal information of bank customers (Lehrfeldand Guest2016). They uses such information to dispense money from impersonate online bank staff without authorized cards. They were able to steal almost 650 million euro from the financial institutions in total. 3.2 Wanna cry virus hits NHS, 2017 Recently, Wanna cry virus infiltrate the NHS’s computer system and create chaos among UK’s medical system. Same virus is used against fedex and infected computers in 150 countries. It spreads through emails. Usually, the exploits are consisted in the mail body or attachment (Flores 2013). When user lick on such attachments, the virus start spreading through their systems, encrypts some files and demand money for accessing such files. It has
6ETHICAL HACKING AS A DEFENCE MECHANISM bbeen reported that, the virus infiltrate over 300,000 computers and stopped when a security researcher discovers a kill switch. 4.0 Ethical hacking Ethical hackers are also uses same technique and tools as criminals to infiltrate certain computers or network devices. The only difference is they tried to hack into systems with the system’s owner permission in order to check vulnerability. The purpose of such hacking is to identifyvulnerabilityandevaluatethesecurityinsystemsinfrastructure.Ithasbeen conducted to check whether unauthorized access is permitted or vulnerable to malicious software such as malware (Dayanandamet al.2013). After finding casualties in certain system,theyinformthedeveloperstofixtheissuesrathertakingadvantageofthe vulnerability. 5.0 Conclusion: As the technology around us is evolving day by day, enormous amount of data is available in the web. Several criminals also want to take advantages of this as they can compromise such information to gain certain benefits. This type of crimes includes infiltrate of any unauthorized system while falsifying email source information, introducing a virus or other contaminant into a computer system, using a computer in a scheme to defraud, utilizing encryption in aid of a crime, using interfering with someone else's computer access or use, copying, modifying, disclosing, using, damaging or taking programs or data and improperly accessing a computer, system, or network.This report describes about the fundamentals of cybercrimes. Cybercrime is a broad topic which cannot be described fully within such short parameter. This report is mainly focused on the ethical hacking.Generally, hackers used some kind of malicious software to inflate targeted system. Computer depended crimes are offences which can only be committed while utilizing the computer devices or network or any application of information technology. This type of attacks involves spreading of
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7ETHICAL HACKING AS A DEFENCE MECHANISM malware, virus and hacking and DoS attacks. On other hand, computer enabled crimes are traditional crimes which can be improved in their reach or scale by utilizing computers, computer network or other type of information technology. Organizations often take several security measures to prevent such vulnerabilities. They also used ethical hackers to evaluate their system in order to find any kind of vulnerability.
8ETHICAL HACKING AS A DEFENCE MECHANISM 6.0 References: Dayanandam, G., Rao, T.V., Reddy, S.P.K. and Sruthi, R., 2013. Password Based Scheme and Group Testing for Defending DDOS Attacks.International Journal of Network Security & Its Applications,5(3), p.17. Flores, D.A., 2013. A social engineering discussion about privacy attacks and defences considering web browsers and social networks. In8th Congress of Science and Technology- ESPE, SangolquÃ, EC. Lehrfeld, M. and Guest, P., 2016, March. Building an ethical hacking site for learning and student engagement. InSoutheastCon, 2016(pp. 1-6). IEEE. Lokhande, P.S. and Meshram, B.B., 2016, March. Analytic Hierarchy Process (AHP) to Find MostProbableWebAttackonanE-CommerceSite.InProceedingsoftheSecond International Conference on Information and Communication Technology for Competitive Strategies(p. 62). ACM. Peacock, D., 2013.From underground hacking to ethical hacking(Doctoral dissertation, Northumbria University). Shetty, S.S., Shetty, R.R., Shetty, T.G. and D'Souza, D.J., 2017, September. Survey of hacking techniques and it's prevention. In2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)(pp. 1940-1945). IEEE. Thomas,D.R.,Pastrana,S.,Hutchings,A.,Clayton,R.andBeresford,A.R.,2017, November. Ethical issues in research using datasets of illicit origin. InProceedings of the 2017 Internet Measurement Conference(pp. 445-462). ACM. Xu, W., Madison, K., Flinn, M. and Kwok, W., 2014. Applying virtualization technology in security education.Procedia-Social and Behavioral Sciences,141, pp.10-14.
9ETHICAL HACKING AS A DEFENCE MECHANISM Yamini, B., Brindha, L. and DEEPANANDA ARTHI, S., 2018. PREVENTION OF DDoS AND SQL INJECTION ATTACK BY PREPARED STATEMENT AND IP BLOCKING. Journal on Software Engineering,12(3).