unit 2-2
unit 2-2
unit 2-2
Computer crime, also known as cybercrime, refers to illegal activities that are carried out using
computers or computer networks.
It involves the use of technology to commit offenses, target individuals or organizations, and
exploit vulnerabilities in computer systems.
Computer crime encompasses a wide range of malicious activities, including hacking, identity
theft, phishing, malware distribution, online fraud, and intellectual property theft.
These crimes pose significant risks to individuals, businesses, and even governments, as they
can lead to financial losses, data breaches, privacy violations, and disruption of critical services.
1. Trojan Horse:
● A Trojan horse is a type of malicious software that disguises itself as legitimate or
desirable software, tricking users into installing or executing it.
● Once inside a system, the Trojan horse can perform various malicious activities,
such as stealing sensitive information, creating backdoors for remote access, or
damaging files and systems.
● Unlike viruses or worms, Trojan horses do not replicate themselves but rely on
user interaction to spread.
● They often enter systems through email attachments, software downloads, or
disguised links, and they can be challenging to detect without proper antivirus
protection.
● To prevent Trojan horse infections, it is important to be cautious when
downloading files, opening attachments, or clicking on suspicious links and to
regularly update and run antivirus software.
2. Trap Door:
● A trap door, also known as a backdoor, is a hidden entry point in a software
program or operating system that allows unauthorized access or bypasses
normal authentication mechanisms.
● Trap doors are intentionally inserted by developers for debugging purposes or to
provide authorized access for system administration.
● However, if a trap door is discovered or exploited by malicious actors, it can be
used to gain unauthorized control over a system, compromise security, or extract
sensitive information.
● Proper security measures, such as regular vulnerability scanning, code audits,
and access controls, can help detect and prevent unauthorized use of trap doors.
● Regular software updates and patches from vendors also help in closing known
trap doors and preventing potential exploitation.
3. Super Zapping:
● Super zapping refers to an unauthorized activity that bypasses normal security
measures to directly access or modify data in a computer system's storage.
● It involves using specialized tools or techniques to directly manipulate data at a
low level, bypassing normal application or system controls.
● Super zapping can be used for malicious purposes, such as unauthorized data
alteration, unauthorized access to sensitive information, or data theft.
● It is considered a serious security threat and can result in data corruption, loss, or
compromise.
● Implementing robust access controls, encryption, and regular monitoring can help
mitigate the risks associated with super zapping attacks.
4. Logic Bomb:
● A logic bomb is a type of malicious code or program that lies dormant until a
specific condition or trigger event occurs.
● Once triggered, the logic bomb executes a predefined action, such as deleting
files, corrupting data, or launching an attack.
● Logic bombs are often used by insiders or disgruntled employees as a means of
revenge or to cause damage to an organization.
● They can be difficult to detect as they may reside within seemingly legitimate
code or programs.
● Regular security audits, monitoring for unusual behavior, and strict access
controls can help identify and prevent logic bomb attacks.
5. Salami Logic:
● Salami logic, also known as salami slicing or penny shaving, refers to a
technique where small amounts of money or resources are fraudulently siphoned
off over a long period.
● In the context of computer systems, it involves manipulating or skimming tiny
increments of data or transactions to accumulate a significant gain over time.
● Salami logic is often used in financial fraud, where small amounts go unnoticed
or are considered negligible by victims or auditing systems.
● Preventing salami logic attacks requires robust security controls, regular
monitoring of transactions and data, and implementing anomaly detection
algorithms to identify suspicious patterns.
● Educating users about the risks and implementing strong authentication
measures can also help prevent unauthorized access and manipulation of
systems.