Cyber Crime

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Hactivists:

An individual who hacks as a means of spreading their political message.

Cyberterrorist:

An individual who uses their hacking ability to instill a sense of fear into the public

Cybercrime:

Any crime that involves a computer and a network, in which a computer may or may not have played an instrumental part in the commission of the crime.

Trojan Horse:

Are commonly sent to a target computer system via e-mails to legitimate users of the system

Types of Hackers:

Black Hat, White Hat, Gray Hat, Script Kiddies, Hactivist, & Cyberterrorist

Two classifications of high technology crimes are

Computer crimes and cybercrimes

Ransomware

Computer systems are infected with malicious code ( malware) and the data within them are made unavailable and inaccessible to owners and/or legitimate users until a fee is paid to the cybercriminal/ Very difficult to determine who has authority to investigate high-technology crimes

Response to Identity theft:

Do not give out personal information like a social security or bank account numbers over the phone. Delete e-mails asking for banking information to help someone who is in need of assistance. Shred all papers containing social security numbers, names, addresses, and similar information before throwing them into the trash. Be careful with credit card receipts and carbons. Destroy the receipts and trash them at another location.

Script Kiddies:

Earn their names from their ability to surf the Internet looking for hacker utility programs and then launching the programs at a target computer system. Most dangerous of the hackers because this individual has no idea how the program will affect the computer system the attack is being launched upon.

What hat recently has witnessed a decrease in use as more businesses have elected to prosecute individuals who attempt these acts?

Gray Hats

It is possible for a terrorist organization or an extremist group to assume another's identity why?

In an attempt to remain hiding during the planning stages of an attack.

Dumpster Diving:

Involves a focus on a search for any documents with credit card information and a user's account information. One approach useful to identity thieves involves the collection of information from university settings.

Identity Theft and assumptions Deterrance Act:

Made it a federal crime to steal an individual's identification information, to include their name, social security number, date of birth, driver's license number, or any other individual identifying piece of information.

White Hat

Main objective is to provide computer security programs that will protect systems from being illegally and maliciously penetrated. Hackers will still search out target computers and then attempt to hack into the systems, but once successful, they will normally cease their activities and alert the owner of the computer system to the vulnerability.

Computer Viruses

Quite possibly the biggest and most expensive problem facing computer users today. One of the more common targets for a computer virus is the boot sector of the target computer's hard drive. Viruses are deposited on the boot sector so that each time the computer is booted up the virus will load itself and run its program.

Denial of Service Attacks:

Refers to an attack in which an Internet website or network server is flooded with enormous amounts of data that in essence consumes all resources of the target computer system.

What is high technology crime?

Refers to any crime involving the use of high-technology devices in its commission (Ex. computers, telephones, tablets, network devices, security systems, check-reading machines, credit card machines)

Data Manipulation:

Refers to the process by which an individual changes data or deletes data from a computer system as a means of causing harm (almost always financial) to the computer's owner.

Service Attacks;

Result in the target computer crashing or shutting down. Goal is to prevent legitimate users from accessing the computer. Advances in computer technology have resulted in computer systems today that are able to handle larger amounts of data requests.

Most dangerous hacker?

Script Kiddies

Reasons an individual will attempt to accomplish this IP Spoofing:

Send out massive amounts of electronic mail. Used by spammers.

6 Types of Identity Theft:

Skimming, Dumpster Diving, Shoulder Surfing, Retail Scams, Packet Sniffing, & Phishing

Identity theft penalty Enhancement act of 2004:

The above statutes are federal statutes but all states have also passed their own identity theft-related statutes. The federal and state governments have made prosecuting individuals for identity theft much easier. Many states have begun limiting the amounts of personal information that individuals can obtain without a thorough verification process.

Web Spoofing:

The act of web spoofing involves the redirection of a user's Internet browser to a given website when the user types in a similar URL address.

Packet Sniffing:

This could allow an individual to intercept credit card information while the data is being transferred to a commercial website. Will read the headers of packets containing credit card information and then make a copy of the information and forward it to the packet sniffing software's administrator.

Theft of a victim's credit identity

This is the fastest-growing high-technology crime in the world .

Phreaking Hacker Ethic:

To a hacker there is no such thing as secured information. The majority of hackers also appear to believe that information should not be secure.

A hacker may enjoy releasing a Trojan horse onto a computer system for a number of reasons

To sabotage the computer network in order to gain access to other computers on the network. To see how the introduction of additional programs will affect the entire system's operations.

Retail Scams:

When a potential victim comes along, the identity thief makes a telephone call to the cashier pretending to be a member of the company's lost prevention or security team. The clerk will be asked to read the check or credit card numbers over the phone.

Shoulder Surfing.

When a user takes out his or her credit card to pay for their merchandise, either in preparation for the payment or after payment has been made and the user is waiting to sign the credit card slip, the identity theft will peer over the user's shoulder. Because many credit card companies utilize the first four to eight numbers on all their credit cards, the identity theft does not have to remember many numbers.

Difference between computer & cyber crimes

While these actors may use similar tactics (e.g., using malicious software) and attack similar targets (e.g., a computer system), they have different motives and intent for committing cybercrimes

Skimmer devices

Work in much the same manner as the electronic card readers that are used in commercial venues when one uses their credit card or debit card. Information stored on a skimmer could be connected to a computer and used to create a fake credit card that would bill all transactions to the original cared owner's account.

Hacker:

individuals who were using their personal computers to gain unauthorized access to other individuals' and businesses' computers

UNODC Definition of Cybercrime

is an act that violates the law, which is perpetrated using information and communication technology (ICT) to either target networks, systems, data, websites and/or technology or facilitate a crime

Cracker:

is generally used to refer to one who violates software copyright protections and gains inappropriate access to password protected files and services

•Hacking

is the most famous and commonly read about computer crime

Situations where data manipulation is used:

-Hacker gain access to a reputable computer software company and destroy any existing research on an upcoming software system. -Former worker uses their security codes to gain access to bank records and then transfers funds into a personal account. -It is believed that the majority of cases involving this technique are inside jobs committed by angry personnel

Hacking requires:

-Unauthorized access of another person's computer -involves the use of a computer as an instrument of the crime. -The computers used in hacking will probably maintain some form(s) of evidence that could be used to confirm the identity of the hackers.

Hacker Technique:

1) Targeting is the first step in the pre-hack stage. 2) May physically select a target that is of interest to them. 3) Use of a port scanner (software packages that scan computer networks to determine if any computers have open port settings).

Global connectivity/technology usage trends

1) There are very few places on Earth where you cannot access the Internet 2) Most countries have at least one Internet service provider 3) global satellite networks can provide Internet access to remote areas. 4) Because of the availability of Internet services through mobile devices, Internet use has been consistently growing 5) Smartphones are becoming less expensive with more features 6) 2016 was the first year in which mobile device access made up the majority of worldwide Internet usage 7) The Internet penetration rate refers to "the percentage of the total population of a given country or region that uses the Internet" 8) As of September 2017, the global Internet penetration rate is estimated at 51% 9) As connections to the Internet become more reliable and more people connect, more important services tend to be provided online

Two classifications of identity theft:

1)Situations in which an individual's identity is stolen and the thief assumes the physical identity of the victim. This title of identity theft is rarely encountered. 2) Situations involving credit fraud/financial fraud

Phishing:

A process whereby an identity thief will attempt to get a potential identity theft victim to provide them with the personal information needed to engage in identity theft. Often times the victim of one of these scams will receive an e-mail or other communication that appears official and requests that the person submit this information in order to maintain their accounts.

Computer Crimes

Criminal activities involving a computer that are made illegal through statute; Computer is used as instrument of crime, is the focus of a crime, and as a repository of evidence

Cybercrime "knows no physical or geographic boundaries" and can be conducted with less effort, greater ease, and at greater speed than traditional crime...

Cybercrime can be perpetrated by individuals, groups, businesses, and nation-states

Phreaking:

One of the oldest computer crimes around—theft of telecommunications service. Refers to any activity resulting in the individual gaining use of a telecommunications service without paying for such services.

Online Identity

Person can gain control of the screen name of another person, they can log into their social networking sites and change settings and posts comments about others who are in the victim's social circle. The theft of someone's virtual identity can be committed as a means of harassment or as a means of sending advertisements and solicitations to larger groups of people to whom the identity thief would not normally have access.

IP Spoofing:

The process of forging a computer's Internet protocol (IP) address

Identity Theft:

The theft of someone's identity through the use of some form of personal identifying information, with the information being used for some fraudulent activity.

Skimming:

The use of a small, often handheld, device that can store several hundred credit card numbers, cardholder names, and card expiration dates.

Black Hat

These are individuals who violate computer security for little reason beyond maliciousness or for personal gain. Hackers write programs to damage computer systems and networks; the result is that computer security and anti-virus manufacturing have become full-time enterprises.

Gray Hat

These hackers are a combination of white-hat and black-hat hackers and are opportunistic. While this may appear to be a form of blackmail, in the business world such decisions may be a matter of cost-benefit analysis. Hackers will search target computers, gain access, notice the system's owner, but they will normally elect to offer to repair the defect for a small amount of money.

There is no

universally accepted definition of cybercrime


संबंधित स्टडी सेट्स

Green Belt - Exam Practice Questions

View Set

Marketing Strategy Exam 3 Question Log

View Set

EDUC 112: Test 4 (Chapter 11, 12, 13)

View Set

Chemija. 10 klasė. IV A grupė.

View Set

TEFL Module 3: Managing the Classroom

View Set

Chapter 8 & 10 Questions, Chapter 6 & 7 Statistics Questions, Statistics Probability Exam

View Set

Amino Acids - Structure to full name

View Set