Basic HTML version of Foils prepared May 19 99

Foil 2 Computer crimes (1)

From Computer Crimes: Examples of Network Security attacks Tango Group Internal Technology Seminars -- April 23 99. by Roman Markowski


Computer crimes
  • First network attack: 1988 (Worm; Robert Morris, Cornell)
  • Attackers: hackers vs. crackers (vandals, spies)
  • hacker are proud of what they are doing and publish their achievements; crackers - hacking for profit
  • US companies lose $7.5 billion annually
Attacks
  • Social engineering method (obtaining username and password from another person)
  • Trojan Horses and system modifications (modified login, su, telnet, in.telnetd, ftp, ls, ps, netstat, ifconfig, find, du, df, libc, sync, inetd, and syslogd)



© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Mon Aug 16 1999