Internet Crime and its Prevention

Pages: 14 (4910 words) Published: March 23, 2013
De La Salle University - Manila

An Introduction to the IM Profession and Ethics Paper
Presented to
The Faculty of the College of Computer Studies
De La University – Manila

In Partial Fulfillment
Of the Requirements for the Degree of
Bachelor of Science of Information Systems


Changcoco, Amos
Dimla, Ysabel Nicole
Ramchand, Pavan
Tanchuling, Bianca Denise
Tibayan, Jan Michael

1.1 Types of Exploits
It is a malicious code that is attached to a file or executable program that can hack the files of the victim’s computer and reformat, delete or modify the files. The virus is executed only when the file that contains the virus is opened or if the program with the virus is executed as well. It leaves infections as it travels from one computer to another. The spread of the virus relies on the users whenever users would use removable media devices, download or through e-mails. An example of a computer virus would be the Pikachu virus which was the first computer virus directed to children. It was said that the virus started on June 28, 2000 from Asia or the Pacific Ocean region. The virus was an email titled, “Pikachu Pokémon” with the message, “Pikachu is your friend.” The email contained the image of the cartoon character, ‘Pikachu’ from the TV series Pokémon, with the message, “Between millions of people around the world I found you. Don’t forget to remember this day every time MY FRIEND.” The Pikachu virus infected only a few companies in the United States through Microsoft Outlook email attachments or through Microsoft’s Internet Explorer browser. The reason why only a few companies were harmed and why the virus was not as viral is that the virus was not coded properly and would ask the user if the virus can delete the files in the user. 1.1.2Worm

A worm is a malicious code that is used for bringing down the computer system. A worm does not infect files, however, it monopolies the computer’s CPU and operating system and is capable of deleting data and programs. It infects a computer by finding vulnerability in an application or operating system. A worm is self-replicating and uses a network to replicate itself to other computer. It does not rely on human interaction for spreading to other computers. An example would be the Morris Worm or also known as the Great Worm. Created by a Cornell University student named Robert Tappan Morris in the year 1968, the Morris Worm consisted of 99 lines of code. Robert Morris wanted to know how big the Internet was and made the worm to find the answer. It is noted that the creator did not have malicious intent in making this worm; however, the worm infected immense amounts of stability problems that made many systems unusable. The damage was over 6,000 infected UNIX machines which cost between $10,000,000 and $100,000,000. This example is an ethical dilemma because the creator did not have evil intentions in making the worm but did have bad effects on most people in America. This dilemma would be ethical based on the psychological egoism theory because Robert Morris acted on his selfish motive whether he should or not, which made him moral. Based on the hedonism theory, it was ethical of Morris because he was only doing his duty without knowing that his actions would bring upon negative effects.

1.1.3Trojan Horse
Named after the Trojan horse from Troy which was used to infiltrate the enemy’s territory through a disguise, the Trojan horse is disguised as something else (such as a program or file) but is actually a malicious code or may contain malicious code. Similar to viruses, a Trojan horse is executed when the file with the virus is opened or the program with the malicious code is executed also. A Trojan horse can do from light damages such as changing the desktop and the like, to threatening damage, such as deleting files, stealing data, or activating and spreading other malware, to the...

References: * (1999, 10). Electronic Commerce. Retrieved 10, 1999, from
* What Is the Difference: Viruses, Worms, Trojans, and Bots? - Cisco Systems. (n.d.). Cisco Systems, Inc. Retrieved from
* What Is A Rootkit? (n.d.). Internet / Network Security - Tips, Advice and Tutorials About Internet Security and Network Security. Retrieved from
* Julian. (2011). 10 Most Notorious Acts of Corporate Espionage. Retrieved from
* Katich, A. (2013). Anonymous (Annie Katich). Retrieved from
* Verini, J. (2010). The Great Cyberheist. Retrieved from
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • cyber crime Essay
  • Crime Prevention Essay
  • Crime Prevention Essay
  • Essay on Crime Prevention
  • Crime Prevention Essay
  • Essay about Crime Prevention
  • Crime Prevention Essay
  • Essay about The Prevention of Crime

Become a StudyMode Member

Sign Up - It's Free