Ch 15 Cybercrime Management: Legal Issues
What is the so-called 419 scam?
419 scams are a type of fraud and one of the most common types of confidence trick. The scam typically involves promising the victim a significant share of a large sum of money, which the fraudster requires a small up-front payment to obtain. If a victim makes the payment, the fraudster either invents a series of further fees for the victim, or simply disappears.
What is the most common complaint about cybercrime from respondents?
Malware infections
Explain the wardialer software.
A wardialer is a downloadable software cracking program that allows a modern attacker to rapidly dial and check all phone numbers within a given range such as from 293-7000. The wardialer produces a log to identify those numbers that are tied to a modem or fax machine based on the handshaking tones. Once a modem is identified, the next step is to uncover the password used to access the modem.
List some of the criminal activities that fall under the mantle of cybercrime.
Fraudulent spam, financial frauds, unauthorized access, industrial espionage, illegal use of encryption, cyberstalking, denial of service, damaging networks or computers, child pornography, fraudulent emails, illegal use of resources obtained from hacking activities, and sending viruses or mail bombs.
List some net frauds.
Nigerian Bank or 419 Scam, Phishing, Mules, Social Engineering
What is phishing?
Phishing occurs when a phisher pretends to be from a legitimate company and requests confidential information, such as passwords, from either a business or a consumer. With an official looking e-mail, the phisher asks the victim to go to a website and fill out their personal information. once the phisher obtains this confidential financial information, they assume the victims identity.
What is the purpose of port scans? Explain.
Port scans are used to identify potential targets for gaining network access.This procedure begins with a ping sent to a web server. Once it is determined that a port is running software with a known bug or an unpatched version of the software, the attacker downloads the published exploit, i.e., code to implement the attack, compiles the code for the specific system, and uses the compiled proram to enter the network. Once inside the network, there are various actions that might be taken to collect proprietary information and place backdoor Trojans on the entry port which allow the hacker to re-enter the system at will.