Ict Report Outline
Ict Report Outline
• Hoaxes
- Emails, messages or posts arriving in chain letter fashion that
often describe impossible events, highly damaging nakware or
urban legends. (Source: trendmicro.com)
- Their intent is to frighten and mislead receipients and get them to
forward to friends. (Source: trendmicro.com)
Examples:
• Fake Sites, Pharming, and Honeypots
➢ Fake sites - counterfeits that attempt to mimic a legitimate
company or present the appearance of some official government
site.
➢ Pharming - companion technique that guides or redirects users to
these fake sites; The goal is to fool users into providing personal
or financial information such as credit card numbers or bank
accounts to the counterfeit site.
➢ Honeypots - servers that are designed to prey hackers; they are
used by security experts to study how intruders attack systems
and to gather forensic information that may lead to their
prosecution
• Cookies and Web Bugs
o Cookies – packet of data that a computer recieves, then sends back
without changing or altering it; its purpose is to help the website
track of your visits and activity.
✓ Session cookies - used only when a person is actively
navigating a website; once you leave the site, the session
cookie disappears.
✓ Tracking cookies - may be used to create long-term records of
multiple visits to the same site.
✓ Authentication cookies - track whether a user is logged in, and
if so, under what name.
✓ Ad-serving cookies – track previous websites you have visited
and then use the information to generate additional targeted
advertising
✓ Flash cookies - set and used by the Adobe Flash player; can
collect data or even activate a webcam on a computer
o Web bug - a very small or transparent embedded graphic that is
associated with an HTTP set-cookie request by a third-party server;
this is often an ad server but could also be associated with hackers
collecting information to be used in some potential future attack
• Bots and Spyware
➢ Bots - any program that can automate some task
o Zombie - program acts under the control of some
remote hacker
Examples:
“good” bot - be a program that can automate Web searching based on
parameters the user provides.
“bad” bot is one used in a DoS attack or as a spambot
➢ Spyware - malware that uses one or more of these techniques
to track your activities and gather personal information from
your computer, usually to sell or use for targeted advertising;
can capture keystrokes to gather passwords and credit card
numbers.
How do spywares enter your computer?
✓ Through free downloads
✓ Through Popup ads