Intro ****

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Network interface card (NIC)

Allows a computer to connect to a network. Every NIC gets its own IP address.

Output devices

Any device used to send data from a computer to another device.

The ARPA net 1969

BBN connected 4 research mainframes: Stanford Research Institute, UCLA, University of California Santa Barbra, and the University of Utah.

Ethernet Cables

Carry signals between the modem, the router, the computer, and other wired internet capable devices.

What is malware? (Malicious software)

Computer viruses, worms, Trojan courses, spyware, adware, or any other destructive software aimed to disrupt computer networks.

The Turing Machine

Created by Alan Turing in 1936. The main functions to get printed symbols on paper tape. This was forward thinking to conclude the modern design of today's computers.

Atanasoff-Berry Computer (ABC)

Created by John Vincent Atanasoff in 1937. This was the first digital computer. Used vacuum tubes for digital computation; had no central processing unit (CPU).

Colossus

Created by Tommy Flowers in 1943. This was the first electronic programmable computer. Was created to help British code breakersread encrypted German messages.

Type Two Offenses

Do not involve malware. Involve multiple or repeated contacts or events from perpetrator to victim.

Switch

Filters and forwards packets to intended recipients on a LAN.

Who was the co founder of Intel?

Gordon Moore

Who is the most susceptible to cyber crime attacks?

Government agencies, utility companies, large corporations and organizations.

Electronic Numerical Integrator & Calculator—ENIAC

Invented by J. Presper Eckert & John Mauchy in 1946, at the University of Pennsylvania. 1,800 square feet- used 18,0. Just a bunch of computers even though it had the power of a small calculator.

System Software

Responsible for controlling, integrating, and managing individual hardware components allowing users to see it as a functional unit.

Processing data

The computer does this is the control center of the computer. Motherboard allows the computer to receive power.

What does the computer as incidental mean?

The computer is not the primary instrument of the crime: it's simply facilitates it.

What does computer as an instrument mean?

The computer is used to achieve some other criminal objective. In other words, a burglar uses crowbars and lock picks as the instruments of crime in a fashion similar to the cyber criminal using computers and networks for crime including theft, fraud, exploitation, and threats of harassment.

Type One Offenses

The crime is a single or discreet event from the point of view of the victim. The crime involves the use of malware including computer viruses, worms, and adware. The crime can, but may not be, facilitated by computer software vulnerabilities.

Crimes associated with the prevalence of computers

This category recognize that some types of crime have emerged or have been greatly facilitated simply due to the ubiquitous and ever present nature of computers and computing in the every day lives of citizens.

What is an input device?

This device is used to provide data and control signals to information processing systems. Examples include: flash drive, keyboard, microphone, computer mouse, WebCam, etc.

Application Software

Windows 10 O.S.X Snow Leopard Microsoft Office Android Adobe Reader

WIFI (wireless fidelity)

Wireless network using radio waves to provide high-speed internet and network connections.

Internet

a conglomeration of Computer networks.

When was the first electronic computer completed?

1945

When did the first long distance communication on the Internet take place?

1969

Fiber optic cables

A bundle of glass threads that transmits messages onto light waves.

RAM (Random Access Memory)

A byte of memory that can be accessed without touching any other bytes. The most common type of memory found in computers and printers. Temporary storage of information. When power goes away, ram goes away- experts are trying to find ways to get RAM without losing the data.

Modern Computers

A complicated system of switches, it only sees the world in 1's and 0's. As a result of the 1's and 0's, this device uses a binary number system. Base ten system: 0-9 then next column Base 2 system: 0-1 then next column.

What is a computer?

A computer is an electronic device that executes the instructions in a program. Accepts Data. Processes data. Produces output. Stores results.

Modem

A device or program that allows the computer to transmit data over telephone or cable lines.

Router

A device that operates between two networks and makes decisions about the best route to send packets on to their destination.

IP address

A group of 4 8-bit numbers. Each computer network gets one.

Hard Drive Disk (HDD)

A hard drive is a memory hardware device that permanently stores and retrieves data on a computer.

Examples of Cyber Crime and Cyber Terrorism

Data destroying viruses that shut down the Internet, computer thieves stealing credit card info and social security numbers, identity theft, terrorist money laundering, and nations launching cyber attacks. Production and distribution of child p, finance crimes, info and corporate espionage, exploitation, and stalking.

Anderson and his colleagues

Developed this classification primarily to derive estimates of the cost of computer crime. Traditional crimes are now "cyber" because they are conducted primarily online (tax fraud). Transitional crimes that have changed with the advent of the Internet (frauds committed online like e commerce fraud). New crimes that have been originated since the advent of the Internet (malware, viruses, worms). Crimes that facilitate other crimes through the misuse of computers (other).

Operating system

Manages the keyboard input, what goes to the screen, how you save files, how you open files.

De-Centralized and Redundant Network

Network would have no central authority.

Solid state Drive (SSD)

No moving parts. Information is stored in microchips.

Who owns the Internet?

No one.

How effective is protective computer software against viruses?

Only about 8.2%

What is the main threat to the Information Age?

The openness of the Internet expended the scope of opportunities for criminals.

What are some new threats created by the Information Age?

Theft of intellectual property. Identity theft in a digital sense.

Gordan and Ford

They developed a two category scheme to classify cyber crimes into type one offenses (technology crimes) or type two offenses (people crimes).

What is cyber crime in cyber terrorism

They encompass the myriad of crimes committed within the vast fields of information technology and computer networks.


संबंधित स्टडी सेट्स

Chapter 4: Workers' Compensation and Unemployment Insurance

View Set

Chapter 15: The Ecology of the West and South, 1865-1900

View Set

Psychosocial Integrity - Mental Health Nursing

View Set

Chapter 1: Consumer Behavior & Marketing Strategy

View Set

Security+ 501 - Comprehensive Exam 2

View Set

Pathology Chapter 8 Nervous System

View Set

American Revolution: Important Events

View Set

A false statement meant to injure a person in the business of insurance is the unfair trade practice of

View Set

Chapter 1: Personal Financial Planning in Action

View Set