M7 Computer Crimes

¡Supera tus tareas y exámenes ahora con Quizwiz!

doxing

Releasing another person's personal information without their permission.

cracker

a person who breaks into a computer system, typically for n illegal purpose

worm

A destructive program that replicates itself throughout a single computer or across a network-both wired and wireless

spoofing

Deceiving a system into thinking you are someone you're not.

static

IP address and IP address that does not change

ISP

Internet Service Provider, provides access to the internet.

denial-of-service (DoS) attack

Large-scale attack using multiple unique IP addresses or machines, sometimes thousands, overloading a system with so many requests it cannot serve normal requests.

URL

Uniform Resource Location. A web address, referencing a specific location on a network and the mechanism for retrieving it.

zombie

a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction

hacker

a computer expert who uses their technical knowledge to overcome a problem. Typically used to bypass security to gain unauthorized access.

cybercrime

a crime that involves a computer and a network

logic bomb

a set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects.

bitcoins

a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems, and which operates independently of a central bank.

Hacktivism

act of hacking or breaking into a computer system, for politically or socially motivated purposes.

Internet Protocol (IP)

address a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication

click-jacking

also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top level page.

e-crime

crime that involves a computer and a network

computer crime

crime that involves a computer and a network.

malware

designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user

hardware disabler

device designed to ensure a self-destruct sequence of any potential evidence; it may be present on or around a computer, with a remote power switch being the most prevalent of the disabler hardware devices

phishing

illegitimate use of an email message that appears to be from an established organization such as a bank, financial institution, or insurance company.

imaging

in digital forensics, a comprehensive duplicate of electronic media such as a hard-disk (bit-by-bit copy). Used for analysis and preserving evidence and cannot be used as working copies.

Trojan horse

malware which misleads users of its true intent. Appears legitimate, but executes an unwanted activity when activated.

steganography

practice of concealing a file, message, image or video within another file.

sniffing

process of monitoring and capturing all data packets passing through the given network.

keystroke logging

recording of keystrokes on a computer, done with a keylogger which creates a log of all keystrokes.

pharming

redirection of uses to false websites without them knowing it. Done by "poisoning" the local DNS cache with redirected IP address

piracy

software piracy is illegally copying, distributing or use of software that doesn't belong to you in a way that violates the copyright.

adware

software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.

Spyware

software which "spies" on your computer, capturing information such as browsing, email message, usernames and password, credit card info and transmits the date to another computer.

dynamic IP address

the IP address that changes from time to time, typically home networks as it is cheaper than static IP addresses.

Firewall

the network security that acts as a barrier for a network, monitoring incoming and outgoing network traffic, allowing trusted traffic in based on security rules.

data remanence

the residual representation of digital data that remains even after attempts have been made to remove or erase the data.

domain name

the unique name that identifies a website using internet protocol (IP) or network domain so others can access.

Cyberterrorism

the use of the Internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.

encryption

translating data into another form, or code, so only people with access to a secret key (decryption key) or password can read it.

computer virus

type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.

script kiddie (skid)

unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites

spam

unsolicited e-mail, usually sent to dozens or hundreds of different addresses.

skimming

use of a device affixed to an ATM to capture credit and debit card information when customers slip their cards into the machines.

port scanning

using an application designed to probe a server or host for open ports


Conjuntos de estudio relacionados

My Lab IBUS330 Ch 5 Practice questions

View Set

Chapter 45: Cerebral Dysfunction (Perry) NCLEX Style Qs, PEDS Neurological questions, Peds neuro, Ch. 48 Musculoskeletal or Articular Dysfunction, Chapter 49: Neuromuscular or Muscular Dysfunction, Chapter 45: Cerebral Dysfunction

View Set

LS7: Inventory and Cost of Goods Sold

View Set

CIST 1122 Lab 10-3 Configuring a VM

View Set

Abnormal Psych Learning Curve 9a

View Set

Chapter 27: Complete Health Assessment, Vital signs Chapter 26 questions, Chapter 26 Measuring Vital Sign

View Set

TX Law of Contracts Ch. Four QUIZ

View Set