Cybercrime

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Neutralization/Drift theory

According to the theory (Skyze & Maza) , most criminal hold conventional values, norms & beliefs, but must learn to neutralize the values before committing crime. There techniques allow individuals to drift into criminality and then back into conventional behavior. Skzye & maza argue that the process of becoming criminal is a learning experience.

Choice theory

All human need survival, love and belonging, power or achievement, freedom or independence, and fun. The work of Dr. William Glasser who wrote about about it. Basically, All we do is behave, that almost all behavior is chosen and that we are driven by our genes to satisfy five basic needs: 1. Survival 2. Love and belonging 3. Power. 4. Freedom and 5. Fun. In practice, the most important need is love and belonging, as closeness and connectedness with the people we care about is requisite for satisfying all of the needs.

Steganography

Also known as data hiding, which includes an assortment of methods for secret communication that can conceal the fact that a message even exists at all.

Goffredson & Hirchi

Argue that a person tendency to commit crime can be found in his or her level of self control. Lack of self control is caused by inadequate child rearing. Individuals who lack self-control are more likely to view online pornography and piracy,

cognitive devlopment

Assumes that individuals develop in a sequential manner. study of how children acquire the ability to learn, think, reason, communicate, and remember

Robert Merton

Believed the cultural goal of American society is economic success. This goal is reached through accepted means such as education, occupation, and deferral of gratification. The lower class has less access to education and good jobs in order to reach economic success

Intrusions

Can be broadly defined as any set of actions that attempt to compromise the integrity, confidentiality, security, or availability of a single computer or network. I.E. difficult to identify once it has occurred. 1988 attack in which hackers stole programs of the U.S. dept of defense. Hacking group " anonymous" and titan rain from Chinese systems.

Stage 3 of moral development

Children begin to take into account the feelings of others. Development to stage 3 insulates people from crime because they have become concerned about others, not just their own needs. Criminals beyond stage 3 are less likely to commit criminal acts.

Stage 2 of moral development

Children define what is right as that which satisfies their needs. That is why it is referred to as hedonistic orientation stage. At this stage, children define something as right if they are not punished for it and it satisfies their need. Therefore, criminal thinks that something is right or wrong only if they get punished and their needs are satisfied.

Virus writers

Come from many walks of life and are typically wealthy enough to afford the computer machinery necessary to practice trade.

Stuxnet

Computer virus produced by Israel and the U.S

Social structure theory

Focuses on why lower class indivdiuals are more likely to commit crime than middle and upper class.

Cybercrime

Has facilitated the expansion of almost every traditional crime, including drug trafficking, black market commerce, money laundering, theft, piracy, stalking, fraud and espionage.

specific deterrence

Is designed to impose a sanction on a convicted offender in order to prevent him or her from continuing to commit criminal acts in the future

strain theory

Saw crime as a result of lack of opportunity in particular economic opportunity. Sometimes called blocked opportunity theory. Merton's theory that deviance occurs when a society does not give all its members equal ability to achieve socially acceptable goals

general deterrence

Seeks to deter would-be offenders from committing criminal acts because of the threat of punishment

Contemporary strain theorist

Sought to extend strain theory in order to explain the instrumental crimes of middle & high class individuals by defined what they have termed the "relative deprivation" experienced by a person of higher economic status. Individuals who are already successful perceive a goal blockage of obtaining ever increasing wealth

computer as incidental

The computer facilitates a crime. Examples: money laundering, criminal enterprise, child pornography & luring victims.

Terrorism

Violence or the threat of violence used in direct pursuit of, or in service of, a political aim.

Malware

Viruses, worms, Trojan horses, spyware, adware, or other destructive software. It's short for malicious software and referred to as a computer contaminant.

Type I Cybercrime

Which is mostly technological in nature and involve a single or discreet event from the point of view of the victim. Involves the use of malware. Can be, but may not be, facilitated by computer software vulnerability.

Worms

a self-contained program (or set of programs) that is able to spread functional copies of itself or its segments to other computer systems (usually via network connections). Unlike viruses, worms do not need to attach themselves to a host program.

Cyber attacks

an attempt by hackers to damage or destroy a computer network or system

Choice theory

an individual commits a crime because he or she makes a rational choice to do so by weighing the risks & benefits of committing the act. When the risk does not outweigh the benefits, the person will not commit the act.

Information Attacks

are focused on destroying or altering contact within a system, but physical and virtual systems are still preserved. Attacks are much less destructive & more disruptive in nature. Can cause major economic damage and loss.

Cybercrime/ digital crime

can be loosely defined as the commission of a crime with the use of a computer and a network. Cybercrime has facilitated the expansion of almost every traditional crime.

Stage 1 of moral development

children comply with authority out of fear. Something is viewed as morally right if punishment is avoided. Individuals who di not pass this stage will think that their criminal behavior is permissible as long as they are not punished for it.

Information infrastructure

defined by (Hanseth, 2002) as "a shared, evolving, open, standardized, and heterogeneous installed base" and by (Pironti, 2006) as all of the people, processes, procedures, tools, facilities, and technology which supports the creation, use, transport, storage, and destruction of information

Social process theory

focus on relationship between socialization & crime. Specifically, These theories analyze the impact of certain factors such as peer group relationships, family relationships and failure in school on crime. The view that criminality is a function of people's interactions with various organizations, institutions, and processes in society.

Flood attack

form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic

Type II cybercrime

has more pronounced human element. Do not involve malware. Generally involve repeated contacts or events from the point of view of the victim. Do not usually involve the use of software. Examples: cyberstalking, harassment, child predation, extortion.

Learning theory

individuals commit crime, including computer crime, because they learn the attitudes, skills and rationalizations necessary to commit these acts. Many times this learning takes place in interaction with parents & peers.

Cyber crimes

inspire fear in consumers and lead to a lack of trust in the security & safety of e-commerce. Computer-related crimes conducted over the internet. Any criminal act that involves the theft or destruction of information, resources, or funds utilizing computers, computer networks and the Internet (includes cyber theft, vandalism and terrorism)

Physical information warfare

involves the physical attack on an information system.

Cyber heist

is a large scale monetary theft conducted through computer hacking, the online equivalent of the real-world bank heist.

Trojan Horses

is a malicious program that is disguised as legitimate software. ... An attacker can either attach a Trojan to useful software, or he can trick you into thinking the Trojan itself is useful software. Trojans cannot replicate themselves, unlike other types of malware such as viruses or worms.

Virus

is actually a piece of code that attaches itself to other pieces of computer software, like software application code or e-mail attachments

The distributed denial-of-service (DDoS)

is an attempt by a cyber attacker to prevent legitimate usage of service. (no control over). I.E flood attack. Oct 2016 attack of DNS provide Dyn and denied access to over 6- e-commerce clients. 2016 electronic jihad program.

Adware

is any software that displays advertising banners or pop-up windows while it is running. Adware is usually included with freeware, i.e., software that is free for you to download and us

Spyware

is any software that sends personal information (e.g. Web sites you visit, email addresses, passwords) from your computer to a third party without telling you and without your consent.

Routine Activities Theory

is based on rational choice theory. Developed by Lawrence cohen & marcus felson. They argued that there is always a steady supply of offenders who are motivated to commit crime. The view that victimization results from the interaction of three everyday factors: the availability of suitable targets, the absence of capable guardians, and the presence of motivated offenders

Cyberterrorism

is specifically premeditated, politically or ideologically motivated attack or threat of attack against information, computer systems, computer programs and data that can result in violence against civilian targets

Information Warfare

is the gathering or use of information & technology to gain an advantage over another party. I.e. Psychological operations, electronic warfare, military deceptions, physical destruction, security measures & information attacks

Computer as instrument

is used as the instrument of the crime when the computer is used to gain some other criminal objective

Cyber

mean real or virtual attached to a compute network.

Cybervictimization

refers to the process of victimizing others through the use of information and communication technologies

Social control theory

seeks to answer the question "why don't individuals commit crime? " This theory assumes that people will violate the law. The answer lies in the strength of an individual ties to conventional individuals and society.

Electronic warfare

seeks to undermine the quality, accuracy, and availability of an adversary's information and inhibit their information-collection abilities.

Cyber terrorism

the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society.

social learning theory

the theory that we learn social behavior by observing and imitating and by being rewarded or punished. Akers grounded four principles. 1. Differential association. 2. Definitions. 3. Differential reinforcement. 4. Imitation

Deterrence Theory

theory of deviance positing that people will be prevented from engaging in a deviant act if they judge the costs of such an act to outweigh its benefits

Smart mob

A group of people who assemble, move, or act collectively by cellular phones or other wireless devices to communicate.

Flash mob

A large public gathering at which people perform an unusual or seemingly random act and then disperse, typically organized by means of internet or social media.

Cryptography

A method to secure & protect information from unwanted eyes & unauthorized use. Often used in conjunction with data hiding. Scrambles information & controlled with a cryptographic key

Worm

A program that reproduces itself over a computer network by breaking into computers much like a virtual hacker. Does not need a computer user to be unleashed. Spread faster. Code red.

Donn B Parker

A senior info systems management consultant & researcher on info and computer security and crime, as well as an intl lecturer on these topics. He published numerous papers, articles and reports that were in leading journals, trade, and news magazines, encyclopedias and much more. A pioneer in early research.

Mujahedeen Secrets

A tool used by middle eastern hacker groups to encrypt communications

General strain theory

Developed by Robert Agnew. Attempts to explain why individuals who feel stress & strain in their lives are more likely to commit crimes. Agnew argues that crime is due to negative affective stages including anger, frustration, depression, disappointment and fear.

Computer contaminant

Malware is also referred to as this. means any data, information, image, program, signal or sound that is designed or has the capability to: (a) Contaminate, corrupt, consume, damage, destroy, disrupt, modify, record or transmit; or

Karl Marx

Theorized that political change could not be achieved without conflict. Defined by this guy, the acts of terrorism aimed at a critical information infrastructure are new tactic used to accomplish political change

Sarah Gordon & Richard Ford

They divided crime into two distinct categories: Type I Cybercrime & Type ii Crimes

differential association theory

theory that individuals learn deviance in proportion to number of deviant acts they are exposed to. 1. Criminal behavior is learned. 2. Criminal behavior is learned in interaction with other persons in a process of communication. 3. The principal part of the learning of criminal behavior occurs with intimate personal groups. 4. When criminal behavior is learned, the learning includes (1) technique of committing the crime, which are sometimes very complicated, sometimes very simple. And (2) the specific directions of motives, drives, rationalization and attitudes. 5. The specific direction of motive's and drives is learned from definitions of legal codes as favorable or unfavorable. 6. A person becomes criminal because of an excess of definition favorable to violations of the law over definitions unfavorable to the violation of the law. 7. May vary in frequency, duration, priority and intensity. 8. The process of learning criminal behavior by association with criminal and anti-criminal patterns involves all the mechanisms that are involved in any other learning. 9. While criminal behavior is an expression of general needs and values, it is not explained by those, since noncriminal behavior is an expression of the same needs and values

Titan rain

used in Chinese systems. A form of an intrusion. In 2004, occurred for 3 years Series of attacks on American defense contractor computer systems downloading terabytes of data. Traced back to computers in Guangdong, China. While the Chinese military is widely believed to have been involved in the attacks, Beijing has consistently denied responsibility.

Flame

was highly destructive & sophistical malware program observed in various countries throughout the middle east. The largest cyber weapon discovered to date and was designed in a way that made it nearly impossible to track down. Designed to carry out espionage. Can steal valuable information- including but not limited to computer display contents, information about targeted systems, stored files, contact data and even audio conversations.


Ensembles d'études connexes

Anatomy and Physiology Exam Review / CH 1 INTRO

View Set

Europe Capitals and Landmarks Study Guide

View Set

MH(Nuerocognitive Disorders, chapter 60 MS)

View Set

World History Second Semester Review

View Set