SlideShare una empresa de Scribd logo
1 de 5
Computer Vandalism
BY, ADITYA SINGH
Computer vandalism is a process wherein there is a program that performs
malicious function such as extracting a user's password or other data or erasing
the hard disk. A vandal differs from a virus, which attaches itself to an existing
executable program. The vandal is the full executing entity itself, which can be
downloaded from the Internet in the form of an ActiveX control, Java applet,
browser plug-in or e-mail attachment.
Who are the computer vandals?
In the early days of the development of malware, the majority of
computer viruses and Trojans were created by students and other young
programmers – plus some older, more experienced programmers. Today,
there are still four main types of computer vandal:
 Skilled students… showing off!
In many cases, students – that have just mastered the use of a
programming language – may want to try out their skills, test their ability
or prove how clever they are. Fortunately, many of these malware
do not actually distribute their malware – instead, they may send the
or worm virus to an antivirus company.
 Inexperienced youths… assisted by the Internet
Young people that haven’t quite mastered the art of programming may
also turn to computer vandalism – sometimes to prove their ‘self-worth’.
In the past, this resulted in primitive viruses. However, there are now
numerous websites that explain how to write and distribute computer
viruses – and how viruses can sidestep antivirus software. So the Internet
has made it much easier for the inexperienced to create their own
 ‘Professional developers’
As young virus writers mature, their experience can make their activities
much more dangerous. Older, talented programmers can create very
‘professional’ computer viruses. These can be sophisticated programs
use innovative methods to intrude into data system domains, or can
exploit security vulnerabilities within operating environments, capitalise
on social engineering or use a range of other tricks.
 Researchers
These are shrewd programmers that are capable of inventing new methods of
infecting computers, concealing the infection and resisting the actions of
antivirus software. The programmer’s objective is to research the potential of
‘computer fauna’. The programmer may choose not to spread their creations –
but actively promote their ideas, via numerous Internet resources that are
devoted to the creation of computer viruses. Those ideas and ‘research viruses’
may then be used by malicious individuals or criminals.
United States v. Robert T. Morris, 1991
Robert Morris was one of the first to be prosecuted under the Computer Fraud and Abuse Act
of 1986. As a Cornell University graduate student, Morris wrote and released onto the Internet
a "worm" program designed to propagate itself automatically without harm to the host
computers, but due to a flaw in its design, the Morris worm caused thousands of computers
nationwide to crash on November 2-3, 1988. By itself, the worm did no permanent damage,
although the estimated cost of rectifying its effects at each location involved ranged from $200
to $53,000. As a graduate student in the Cornell University computer science department, he
full and legal access to all the department's computing facilities; these facilities were connected
to the Internet.
Although Morris' defense claimed the worm was a benign test of computer security that went
wrong, Morris was convicted on the grounds that he intentionally accessed remote computers
without authorization. He was sentenced to 3 years probation, fined $10,050, and ordered to
perform 400 hours of community service, a sentence far less than the maximum permissible
under law. The conviction later was upheld by a federal appeals court, and review was denied
the Supreme Court.
SOURCE: United States v. Robert T. Morris, No. 89-CR-139 (N.D.N.Y.), aff'd 928 F.2d 504 (2nd
Cir. 1991), cert. denied, 112 S. Ct. 72 (1991).

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Botnets
BotnetsBotnets
Botnets
 
Malware
MalwareMalware
Malware
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 

Similar a Computer Vandalism

What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technologyAhmed Muzammil
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...theijes
 
Web virus activity
Web virus activityWeb virus activity
Web virus activitySim_Dhillon
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar pptvipinkumar940
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Computer worm
Computer wormComputer worm
Computer wormzelkan19
 
Computer worm
Computer wormComputer worm
Computer wormzelkan19
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Computer Virus
Computer Virus Computer Virus
Computer Virus bebo
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 

Similar a Computer Vandalism (20)

Eh34803812
Eh34803812Eh34803812
Eh34803812
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technology
 
Viruses
VirusesViruses
Viruses
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer worm
Computer wormComputer worm
Computer worm
 
Computer worm
Computer wormComputer worm
Computer worm
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 

Último

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Último (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Computer Vandalism

  • 2. Computer vandalism is a process wherein there is a program that performs malicious function such as extracting a user's password or other data or erasing the hard disk. A vandal differs from a virus, which attaches itself to an existing executable program. The vandal is the full executing entity itself, which can be downloaded from the Internet in the form of an ActiveX control, Java applet, browser plug-in or e-mail attachment. Who are the computer vandals? In the early days of the development of malware, the majority of computer viruses and Trojans were created by students and other young programmers – plus some older, more experienced programmers. Today, there are still four main types of computer vandal:
  • 3.  Skilled students… showing off! In many cases, students – that have just mastered the use of a programming language – may want to try out their skills, test their ability or prove how clever they are. Fortunately, many of these malware do not actually distribute their malware – instead, they may send the or worm virus to an antivirus company.  Inexperienced youths… assisted by the Internet Young people that haven’t quite mastered the art of programming may also turn to computer vandalism – sometimes to prove their ‘self-worth’. In the past, this resulted in primitive viruses. However, there are now numerous websites that explain how to write and distribute computer viruses – and how viruses can sidestep antivirus software. So the Internet has made it much easier for the inexperienced to create their own
  • 4.  ‘Professional developers’ As young virus writers mature, their experience can make their activities much more dangerous. Older, talented programmers can create very ‘professional’ computer viruses. These can be sophisticated programs use innovative methods to intrude into data system domains, or can exploit security vulnerabilities within operating environments, capitalise on social engineering or use a range of other tricks.  Researchers These are shrewd programmers that are capable of inventing new methods of infecting computers, concealing the infection and resisting the actions of antivirus software. The programmer’s objective is to research the potential of ‘computer fauna’. The programmer may choose not to spread their creations – but actively promote their ideas, via numerous Internet resources that are devoted to the creation of computer viruses. Those ideas and ‘research viruses’ may then be used by malicious individuals or criminals.
  • 5. United States v. Robert T. Morris, 1991 Robert Morris was one of the first to be prosecuted under the Computer Fraud and Abuse Act of 1986. As a Cornell University graduate student, Morris wrote and released onto the Internet a "worm" program designed to propagate itself automatically without harm to the host computers, but due to a flaw in its design, the Morris worm caused thousands of computers nationwide to crash on November 2-3, 1988. By itself, the worm did no permanent damage, although the estimated cost of rectifying its effects at each location involved ranged from $200 to $53,000. As a graduate student in the Cornell University computer science department, he full and legal access to all the department's computing facilities; these facilities were connected to the Internet. Although Morris' defense claimed the worm was a benign test of computer security that went wrong, Morris was convicted on the grounds that he intentionally accessed remote computers without authorization. He was sentenced to 3 years probation, fined $10,050, and ordered to perform 400 hours of community service, a sentence far less than the maximum permissible under law. The conviction later was upheld by a federal appeals court, and review was denied the Supreme Court. SOURCE: United States v. Robert T. Morris, No. 89-CR-139 (N.D.N.Y.), aff'd 928 F.2d 504 (2nd Cir. 1991), cert. denied, 112 S. Ct. 72 (1991).