rhcp

rhcp

Thursday, June 5, 2014

Examples of Cybercrime

         Spamming is sending the same message indiscriminately to a large number of users on the internet. Peer to peer file sharing is the sharing of copyrighted files between peers. Phishing is a deliberate attempt to trick someone into receiving personal information. creating and releasing malicious computer viruses  Theft of computer services. Cyberstalking is a form of harassment taking place on the internet.

       
                 Malware is malicious software such as viruses, worms, and Trojan horses .Viruses are pieces of code usually hidden in the operating system of a computer or in an application program.  When a user executes a program containing a virus, the virus quickly copies itself to an unprotected program.  Can jump from one computer to another when someone uses a disc, flash drive, or a computer network with an infected machine.  Most viruses are operating system specific.

 

 
 
 

Wireless Networking Precautions

        Using a wireless internet network ( Wi-Fi) has many advantages for internet users. It allows you to be able to work in any room of your home and even outside your house and still be able to connect to the internet. Along with the advantages, Wi-Fi also comes with some security issues. If you can pick your Wi-Fi signal from outside your house, that means that others will be able to do the same. Wireless internet users need to take some extra precautions to protect their information from being taken or hacked into by others.

 

        The best way to protect our computer when you have Wi-Fi is to make sure that you have an up-to-date antivirus program installed on your computer. Most anti-virus software will automatically scan your computer to check for any possible threats or viruses. By enabling a WEP or WPA (encryptions on your computer) you can help prevent any intruders from accessing your computer and installing a virus or worm on it. This is very important for wireless internet users as any half-way decent hacker can use your Wi-Fi connection to get into your computer.


http://www.itlist.com/security-precautions-for-wireless-internet-users/

Cloud Computing

 

 

 

Cloud computing refers to a model of network computing where a program or application runs on a connected server or servers rather than on a local computing device such as a PC, tablet or smartphone.  A user connects with a server to perform a task. The difference with cloud computing is that the computing process may run on one or many connected computers at the same time, utilizing the concept of virtualization.

 

Cloud computing refers to a computing hardware machine or group of computing hardware machines commonly referred as a server or servers connected through the Internet.  Any individual user who has permission to access the server can use the server's processing power to run an application, store data, or perform any other computing task.

http://en.wikipedia.org/wiki/Cloud_computing

Internet Filters and Parental Control Software

   Internet filters and parental control software are terms describing software designed to restrict or control the content a reader is authorized to access, especially when utilized to restrict material delivered over the Internet. Content-control software determines what content will be available or what content will be blocked.

     A government can attempt to apply them nationwide or they can, for example, be applied by an ISP to its clients, by an employer to its personnel, by a school to its students, by a library to its visitors, by a parent to a child's computer, or by an individual user to his or her computer. The motive is often to prevent access to content which the computer's owner(s) or other authorities may consider objectionable.

Radio Frequency Identification

         Radio-frequency identification is the wireless non-contact use of radio-frequency electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by and read at short ranges via magnetic fields.
           Others use a local power source such as a battery, or else have no battery but collect energy from the interrogating EM field, and then act as a passive transponder to emit microwaves or UHF radio waves. Battery powered tags may operate at hundreds of meters. Unlike a barcode, the tag does not necessarily need to be within line of sight of the reader, and may be embedded in the tracked object.

http://en.wikipedia.org/wiki/Radio-frequency_identification

Digital Image Steganography







        Steganography is the practice of concealing a message, image, or file within another message, image, or file.  Generally the hidden messages will appear to be part of something else: images or articles.  The hidden message may be recorded in invisible ink only to be revealed when a UV light is shown on the message.  The goal of steganography is to keep the message cryptic so it does not attract attention to itself. 

 

         Steganography includes concealment of information within computer files.  In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size.


http://en.wikipedia.org/wiki/Steganography

Computer Forensics





   Computer forensics pertains to legal evidence found in computers and digital storage media.  The goal of computer forensics is to examine digital media by identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.  It is usually associated with the investigation of a major world wide computer crime, computer forensics are often used in civil proceedings.  Computer forensics recovers data but with guidelines made to create a legal audit trial.  Evidence from computer forensic investigations has been used in a number of high profile cases and is becoming very reliable within the U.S and European court systems.

 

          The purpose of computer forensics techniques is to search, preserve and analyze information on computer systems to find potential evidence for a trial. Just opening a computer file changes the file -- the computer records the time and date it was accessed on the file itself.  If detectives seize a computer and then start opening files, there's no way to tell for sure that they didn't change anything. Lawyers can contest the validity of the evidence when the case goes to court.­ Computers are getting more powerful, so the field of computer forensics must constantly evolve.


http://computer.howstuffworks.com/computer-forensic.htm
http://en.wikipedia.org/wiki/Computer_forensics