Ethics Chapter 7
60. What is a botnet? Describe two uses of botnets.
A botnet is a collection of bot-infested computers managed by a bot herder. Two uses of botnets are the distribution of spam and as spyware: stealing of files, or logging of keystrokes.
61. What is a cyber attack? Give two examples of politically motivated cyber attacks since 2007.
A cyber attack is a computer-to-computer attack that undermines the confidentiality, integrity, or availability of a computer or information resident on it. Examples would be the attack in Estonia, Georgia, the Exiled Tibetan Government, Stuxnet, the People's Liberation Army, and Anonymous
62. Summarize the benefits and risks associated with online voting.
Benefits: People who ordinarily couldnt get to the polls could vote. Votes could be counted more quickly. there would be no ambiguity. Money would be saved. Tampering would be minimized. Overvoting would be eliminated. Risks: Gives an unfair advantage to those who are financially better off. The same sytem that authenticates the voter records the ballot violating privacy. Online voting increaces the opportunities for vote selling and vote solicitation. The website hosting the voting would be a target for a DDos attack. Security could be a problem, viruses could target then change votes.
118. The ____________________ criminalizes a wide variety of hacker-related activities
Computer Fraud and Abuse Act
120. Vote-counting irregularities in the State of __________ in the 2000 U.S. Presidential election led to more interest in computerized voting systems.
Florida
58. What is malware? Briefly describe four different kinds of malware.
Malware is malicious software. Different types are: the virus, the worm, cross-site scripting, drive-by downloads, trojan horses and backdoor trojans, rootkits, spyware, adware, bots and botnets
57. Briefly relate the story of the Firesheep extension to the Firefox browser. What capability did Firesheep provide its users? What happened after Firesheep was released? Was Eric Butler wrong to release Firesheep to the public?
Sidejacking is the hijacking of an open web session by the capturing of a user's cookie, giving the hijacker the same privileges of the true user. Eric Butler released an application of this flaw to the public hastening the fixing of this security hole. Ethically, he was probably wrong, but he was damn effective. Act Utilitarianism Yes. Virtue Ethics Yes. Kantianism No.
59. Explain the similarities and differences between computer viruses and computer worms
a virus is a piece of self replicating code embedded within another program called a host. A worm is a self-contained program that spreads through a computer network by exploiting holes.
145. A software program that responds to commands sent by a command-and-control program located on an external computer is called a a) bot. b) spoof. c) vampire. d) virus. e) worm.
a) bot.
113. A file accompanying an email message is called an __________.
attachment
150. Anonymous is a) an activist group that promotes the interests of the Recording Industry Association of America. b) a loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites. c) the name given to the People's Liberation Army group that was responsible for more than 100 intrusions around the world. d) the name of the group that launched the Stuxnet worm. e) All of the above except c.
b) a loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites.
149. Determining that a person is who he or she claims to be on a computer is called a) accountability. b) authentication. c) authorization. d) debugging. e) social engineering.
b) authentication.
115. According to some estimates, 90 percent of spam is distributed through _______ networks.
bot
141. A program with a benign capability that conceals another, sinister purpose is called a a) hack. b) rogue. c) Trojan horse. d) virus. e) worm.
c) Trojan horse.
147. An intentional action designed to prevent legitimate users from making use of a computer service is called a) a bombing run. b) a curtain closer. c) a denial-of-service attack. d) an electronic overdose. e) phreaking.
c) a denial-of-service attack.
148. The process of determining that a user has permission to perform a particular action on a computer is called a) accountability. b) authentication. c) authorization. d) debugging. e) social engineering.
c) authorization.
144. The Internet worm was released by a) John Barlow. b) Katie Hafner. c) John Markoff. d) Robert Morris, Jr.. e) Bruce Sterling.
d) Robert Morris, Jr..
143. The Conficker worm is notable because a) it is Cuba's first attempt at cyberwarfare. b) it is the fastest spreading worm of all time. c) it shut down the White House Web site for three days. d) computer experts have found it particularly difficult to eradicate. e) All of the above.
d) computer experts have found it particularly difficult to eradicate.
146. Manipulating someone within an organization to gain access to confidential information is called a) diving. b) hacking. c) phreaking. d) social engineering. e) trashing.
d) social engineering.
139. A piece of self-replicating code embedded within another program is called a a) hack. b) rogue. c) Trojan horse. d) virus. e) worm.
d) virus.
119. An intentional action designed to prevent legitimate users from making use of a computer service is called a _________________.
denial-of-service (DoS) attack
142. You may find a virus a) on a hard disk. b) on a floppy disk. c) on a CD-ROM. d) in an email attachment. e) All of the above
e) All of the above
140. A self-contained program that spreads through a computer network by exploiting security holes is called a a) hack. b) rogue. c) Trojan horse. d) virus. e) worm.
e) worm.
116. A ___________ is a computer, positioned between a local network and the Internet, that monitors the packets flowing in and out.
firewall
56. Explain how the meaning of the word "hacker" changed between the 1950s and the 1990s.
in it's original meaning, a hacker was an explorer, a risk taker, someone who was trying to make a system do something it had never done before. Today hackers are people who gain unauthorized access to computers and computer networks.
117. The manipulation of a person inside an organization to gain access to confidential information is called ________________.
social engineering
112. A ___________ is a piece of self-replicating code embedded within another program called the host.
virus
114. A _________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network.
worm