Basic HTML version of Foils prepared July 6 99

Foil 73 Computer crimes (1)

From Security Infrastructure fo Electronic Commerce and Internet CPS714 Computational Science Information Track -- June 2 and June 7 99. by Roman Markowski


Computer crimes
  • First network attack: 1988 (Worm; Robert Morris, Cornell)
  • Attackers: hackers vs. crackers ( vandals, spies)
  • hacker are proud of what they are doing and publish their achievements; crackers-hacking for profit
  • US companies lose $7.5 billion annually
Attacks
  • Social engineering method (obtaining username and password from another person)
  • Trojan Horses and system modifications (modified login, su, telnet, in.telnetd, ftp, ls, ps, netstat, ifconfig, find, du, df, libc, sync, inetd, and syslogd)



© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Tue Jul 6 1999