IST 402 Exam 1

Ace your homework & exams now with Quizwiz!

Computer as a tool

"a computer system can be the instrument that is used to commit a crime" (Online Fraud)

Computer is incidental to the crime

"the computer plays a minor role in the offense"

Computer as a target

"the perpetrator attacks a computer system by breaking into it or by bombarding it from outside" (hacking, DDoS attacks)

Carding

The use and abuse of a credit card number or the identity associated with that account

Cybercrime Markets: Customer Service

Two important factors that help ensure that buyers will be satisfied with sellers' products and services are: their speediness in responding to customers' requests/messages, and the quality of the product

Boot sector

A region of any sort of storage media or the hard disk of a computer that can hold code which is loaded into memory by a computer's firmware.

Recording Industry Association of America (RIAA)

A trade organization that supports the recording industry and those businesses that create, manufacture, or distribute legally sold and recorded music within the U.S.A.

Miller v. California (1973)

A worker may be deemed obscene, and therefore not protected by the First Amendment right to free speech

Child pornography

Defined as the depiction of "the sexual or sexualized physical abuse of children under 16 years of age or who appear to be less than 16 that would offend a reasonable adult"

Warez Doodz

Hackers in the early 1980s began to subvert protections on software in order to share programs with others.

Physical abusers

Have direct physical contact with children and are similar to groomers in that they may or may not access child porn and may have cultivated a relationship with their victim online

Hacker spaces

Have emerged over the past decade as a way for individuals with knowledge of technology to come together in order to share what they know with others.

Escorts

High-end call girls that comprises the highest echelon of sex workers and are thought to make much higher wages than other sex workers

Boot Sector Viruses

Installs their code into the boot sector of either a form of storage media (i.e., flash drive) or the hard disk of the targeted computer

Digital Immigrant

an individual who grew up in the analog media era and who generally has more trouble adapting to new digital technologies, despite perhaps a desire to use and understand them

Cyberdeviance

are behaviors that may not be illegal but go against local norms or values

Morris worm

created by Robert Tappan Morris in 1988 - designed to measure the size of the Internet, but errors in the code caused it to spread out of control - led to the creation of the first Computer Emergency Response Team (CERT)

UK Computer Misuse Act (1990)

criminalizes unauthorized access to computer material and unauthorized modification of computer material - does not allow for direct cases against malware writers

Massage parlors

he larger proportion of sex workers operate behind closed doors in homes, apartments, and businesses where the risk of arrest is substantially lower.

419 scams

reference Nigerian legal statutes used to prosecute fraud - Advance fee email schemes

MuTation Engine

(MtE) (1991): A polymorphic generator that not only encrypted the virus but randomized the routine used so that it varied with each replication.

Malware

(malicious software) is a term used to encapsulate the range of destructive programs that can be used to harm computer systems, gain access to sensitive information, or engage in different forms of cybercrime.

Internet Watch Foundation (IWF)

A charitable organization focused on reducing the amount of child porn available and exploitation materials hosted worldwide and criminally obscene adult content in the UK.

Botnets

A blended threat combining multiple elements of existing malware together - Botnet operators can use their infected systems to engage in various types of attacks, Distributed Denial of Service Attacks (DDoS)

Phishing

A form of fraud perpetrated in part by email in which individuals attempt to obtain sensitive financial information from victims to engage in identity theft and fraud

What is a hack

A hack typically involves the modification or alteration of computer hardware or software to enable technology to be used in a new way, whether for legitimate or illegitimate purposes

International Centre for Missing and Exploited Children (ICMEC)

A non-profit agency that is focused on building partnerships in a global context to better investigate child exploitation cases and build the legal capacity of nations so that there is consistency in laws to prosecute these offenses.

National Crime Agency (NCA)

Addresses serious and organized crime in the UK, including cybercrime, fraud, and other Internet crimes

Creation of the video cassette

Allowed for consumers to record content using inexpensive recording cameras that put images on to blank tapes rather than film stock

Hacker Subculture: Technology

An individual's connection to technology and their sense of ownership over the tools of their "craft" increases their ability to hack, n order to establish such a connection, hackers must develop a deep appreciation of computers and be willing to explore and apply their knowledge in new ways, Hackers interest in technology begins at an early age, Identifying peers on and off-line who share their passion for technology helps maintain their interests and is also useful in the development of their skills and ability.

Entities that Combat Malware

Anti-Malware Testing Standards Organization (AMTSO) was formed in 2008 in order to improve the process of malware identification and product testing, the design of software and methodologies for analysis, and to identify standards and practices that can be implemented across the security industry

Cybercrime

Any criminal action perpetrated primarily through the use of a computer

Trojan Horses

Appear to be a downloadable file or attachment that individuals would be inclined to open (e.g., "Receipt of Purchase), however, when the file is opened it executes some portion of its code and delivers its payload on the system. Utilizes social engineering techniques to entice users to open their files.

Non-secure collectors

Are technologically savvy and use peer-to-peer file-sharing programs and other more secured sources to access content. They have greater social connections that engender access to child porn though they take no real steps to protect whatever content they collect.

Hook-up apps

AshleyMadison.com

Travelers

Attempting to find children to molest

Violent Crimes Against Children International Task Force (VCACITF)

Began in 2004 and is now the largest global task force in the world that investigates child exploitation cases.

Technology as a Communications Medium

CMCs make it easy for offenders to connect with one another, The ability to connect in online environments has enabled the formation of virtual subcultures

Torts

Cases involving contracts, property, and personal injuries

National Fraud Intelligence Bureau (NFIB)

Collects information on various forms of fraud and aggregates this data along with reports from business and industry sources into a large database called the NFIB Know Fraud system

Networking

Communicating and sharing ideas with like-minded persons

Capture the Flag

Competitions are a way to show hackers mastery of technology and occur at cons like DefCon where hackers compete to hack one another while also defending their resources from others.

Street prostitutes

Comprise 10-20% of all sex workers and are often racial minorities who receive very low wages and face significantly higher rates of arrest

Financial Coalition Against Child Pornography (FCACP)

Comprises 35 financial institutions and ISPs which operate jointly to handle complaints of child porn and disrupt the businesses that are engaged in the sale of or profit generation from this content.

CMC

Computer Mediated Communication

Virtual Global Taskforce (VGT)

Coordinates responses to multinational investigations.

Children's Internet Protection Act (CIPA)

Covers all schools that teach students from kindergarten through twelfth grade, and the Neighborhood Children's Internet Protection Act (NCIPA) which encompasses public libraries

Berne Convention

Created in 1886 in response to concerns about how IP should be handled and protected internationally.

Cyber-Deception/Theft

Criminal acquisitions that can occur online

Truth in Domain Names Act of 2003

Criminalized the use of misleading domain names to draw Internet users to websites hosting sexually explicit or obscene content

Prosecutorial Remedies and Other Tools to end the Exploitation of Children Today Act (or PROTECT Act) of 2003

Criminalized virtual child porn and extended the legal definition to include "a digital image, computer image, or computer-generated image that is, or is indistinguishable from, that of a minor engaged in sexually explicit content."

Commodity

Customers of prostitutes viewed sex and sex workers as a commodity - encounters can't occur without payment

Criminal Law

Deals with the violation of a statute, The majority of criminal cases happen at the state level, addresses an individual's wrongs against society

Ransomware/ Scareware

Demands that the operator of the infected system pay in order to have their system's functionality restored, Similar to a trojan in that it spreads through downloadable files or websites, Once activated, the payload of the malware may encrypt the user files or modify the boot record in order to restrict user access, The payload may also include messages that are displayed to the victim indicating that their computer has been used for illegal activities (e.g., child porn) and has been shut down by law enforcement or that the computer's OS has been corrupted

ThinkUKnow

Designed to educate children and adults about threats to youth safety.

Operation Predator

Designed to facilitate the investigation of child exploitation both in the USA and abroad

Operation Rescue Me

Designed to identify victims of child exploitation.

DDoS

Distributed Denial of Service Attack

Personally Identifiable Information (PII)

Drivers' licenses, passports, debit/credit cards etc.

Carding Markets

Enable individuals to engage efficiently in credit card fraud and identity theft with minimal effort and limited technical knowledge or skill.

Grooming

Engaging in inappropriate communication with children

North American Many-Boy Love Association (NAMBLA)

Established in 1978 arguing that it was implausible that anyone under a certain age can't understand or truly express their desire for an emotional or romantic relationship

Child Pornography Prevention Act of 1996

Extended existing laws regarding child porn by establishing a new definition for it

Vulnerabilities

Flaws in either computer hardware or software, Vulnerabilities provide a point of compromise and are present in nearly all technologies

Obscene Publications Act (OPA) 1959

For England and Wales indicates that any article may be obscene if its effect on the audience member who reads, views, or hears it is to "deprave and corrupt."

World Intellectual Property Organization (WIPO)

Formed in 1967 that provides a global forum for IP services, policy, information and cooperation. It was integrated into the UN in 1974.

Copyright, trademark, or patent

Forms of legal protection for IP that provide exclusive use of an idea or design to a specific person or company, the right to control how it may be used, and legal entitlement to payment for its use for a limited period of time.

Cybercrime Markets

Forums and IRC channels help to establish a marketplace between sellers advertising their products openly for purchase and buyers interested in seeking such products.

Producers

Go one step beyond abusers as they document abuse in which others engage.

Aaron Swartz

Good guy, downloaded too many articles???? Founded reddit, founded Demand Progress, PACER, JSTOR

Subcultures

Groups which have their own values, norms, and traditions that set them apart from and/or in opposition to the dominant culture

Rule 34

If it exists, there is pornographic content of it

Civil Law

If you are suing or being sued, Disputes between private individuals, Damages are paid by the guilty party; no prison/jail time

CFAA

In the U.S., the Computer Fraud and Abuse Act (CFAA) is the primary federal law used to prosecute in hacking cases

Information Technology Act of 2000

India criminalized sexual offenses involving a person under the age of 18 through this amendment

Copyright Protections

Individuals are given copyright protections from the time a work is created, though they must register their copyright with the government to ensure that they are given all necessary protection under the law.

Cyber-trespass

Individuals cross boundaries of computer systems into areas where ownership has already been established

Sexual fetishes

Individuals experience sexual arousal or enhancement of a romantic encounter based on the integration of physical objects or certain situations

Drop services

Individuals pursue electronics and other goods electronically using stolen cards, have them shipped to intermediaries who pawn the items, and then wire the cash to interested parties

Criminal Justice and Immigration Act 2008

Individuals who publish or sell obscene articles for economic gain and are found guilty of violating the OPA may be fined and imprisoned for between three and five years under a recent enhancement of sentences

What is a Hacker

Individuals with a profound interest in computers and technology, Use this knowledge to access computer systems with or without authorization from the system owner

Exploit Packs

Installed on web servers in order to attack individuals visiting a website, Individuals who visit a website hosted on the infected server will have their browser silently attacked, Once the infection payload is executed, the attacker can then send additional malware to the system to gain further control over the system

Intellectual Property

Intellectual property is a critical term to understand when discussing digital piracy - An original idea that involves some form of creative expression when put into a fixed medium that becomes a tangible property viewable by others

Violent Crimes Against Children (VCAC)

Investigates a range of sexual offenses and criminal activities that affect youth ranging from child porn to sex trafficking to kidnapping

Child Protections Operations (CPO) Team

Investigates and coordinates the response to child exploitation cases both domestically and internationally.

U.S. Postal Inspection Service

Investigates child exploitation cases since child porn and obscene content was distributed directly via postal mail prior to the development of the Internet

Immigration and Customs Enforcement (ICE)

It is the largest investigative agency within the Department of Homeland Security that investigates the flow of people, money, drugs, guns, fraudulent items, and other items across U.S. national boundaries

Street-walker/SW

Johns referred to sex workers on the basis of where they worked, whether in streets, strip clubs, or advertised online using abbreviations to indicate that the worker is a street-walking prostitute.

Canadian Anti-Fraud Centre (CAFC)

Joint effort of the Royal Canadian Mounted Police (RCMP), Ontario Provincial Police, and the Competition Bureau

Child Exploitation Task Forces (CETFs)

Joint operations of federal, state, and local law enforcement officers.

Andrew Auernheimer

Kinda a tool, did the stuff with the phone company

Obscene Publications Act (OPE)

Made it illegal to sell, possess, or publish obscene material although not clearly defined in the law - Law enforcement could also search, seize, and destroy any content found - Similar legal structures emerged in Europe and the Americas to help minimize the perceived corrupting influence of such content on the masses

Distributors

Make up the final category and are responsible for sharing the content used by offenders in any of the previous categories. They may be poorly/well connected to others based on the type of content they share and are much more careful to secure their activities from law enforcement. They are also likely not to have direct contact with child victims and instead operate as a middleman to make content available.

Copyright Act of 1976

Makes it a federal crime for someone to willfully infringe an existing copyright for: commercial advantage, private gain, or by reproducing one or more copies of a copyrighted work with a value of more than $1000 during a 180-day period (can lead to misdemeanor charges)

Identity Theft and Assumption Deterrence Act of 1998

Makes it a federal crime to possess, transfer, or use a means of identification of another person without authorization with the intent to commit or aid in the commission of illegal activity at the local, state, or federal level.

Dating websites

Match.com, plentyoffish.com

Extreme pornography

Materials produced for the purpose of sexual arousal which depict acts that "threaten a person's life; acts which result in or are likely to result in serious injury to a person's anus, breasts or genitals; bestiality; or necrophilia"

High-tech

Methods via computers and/or Internet

Anti-Phishing Working Group (APWG)

Not-for-profit global consortium of researchers, computer security professionals, financial industry members, and law enforcement to document the scope of phishing attacks and provide policy recommendations to government and industry groups worldwide

Viruses

Oldest form of malware, an neither be activated nor execute its payload without some user intervention

National Center for Missing and Exploited Children (NCMEC)

One of the key non-profit organizations in the U.S. that deals with missing children and child exploitation.

Secure collectors

Only access child porn via secured/private networks and deliberately categorize and index their collections. They also exchange content with others as a means to gain access to secured child porn-sharing groups and networks.

Wifey and Hubby

Operated their own pornographic website selling content they produce since 1998

Motion Picture Association of America (MPAA)

Operates to protect the IP of their artists and creative producers.

Sexting

People can send photos/videos of themselves in provocative outfits or engage in sexually suggestive activities with great ease through text messaging

Revenge porn

People often post content they receive from an intimate partner after a relationship sours or by hacking someone's phone/email account in order to acquire pictures and embarrass the sender

Cam whores

Performers who engage in text-based conversations with individuals viewing them in streaming-video feeds and take requests for specific behaviors or sexual acts

PINs

Personal Identification Numbers

Phreaking

Phone hacking became popular in the counterculture as an expression of discontent against the phone companies

Exploit

Piece of code, that takes advantage of the vulnerability to gain control of a system

Warez

Pirated files that were initially distributed through password-protected Bulletin Board Systems (BBSs), which allowed for individuals to gain status by providing access to new or hard-to-find files.

Trawlers

Search actively for child porn through various browsers as they have generally few connections to others to facilitate access to content and take no steps to conceal their activities

Cybercrime Markets: Price

Prices on the online market are subject to scrutiny, Discounts and deals are offered to attract prospective customers,Price serves as an important first step in establishing a relationship between buyers and sellers

Work-at-home schemes

Promise recipients substantial earnings for just a few hours of work per day.

CyberTipline

Provides an electronic resource for individuals to report suspected incidents of child abuse, child porn, and sexual exploitation

Punishment Under the CFAA

Punishments for these acts vary based largely on the harm caused by the incident, For acts of trespass designed to obtain national security information (Sect. (a)(1)) the punishment is a minimum sentence of 10-20 years, While simply accessing a computer and obtaining information of value (Sect. (a)(2)) varies from one year in prison and/or a fine, up to 10 years if the offender has either multiple charges brought against them or if they engaged in the offense for commercial or private gain, Individuals who trespass on government-controlled computers (Sect. (a)(3)) can receive both a fine and imprisonment for not more than one year, though if it is part of another offense it may be up to 10 years.

Child sexual abuse material

Refer to what is otherwise considered child pornography on the basis that since children are unable to give consent, and are being harmed physically and emotionally, the phrase pornography is reductive and unfair to the victims

Dark Web

Referencing the portion of the Internet operating on the specialized encrypted software platform Tor.

Mileage

Refers to a sex worker's appearance and how it had degraded over time in the sex trade.

Girlfriend experience (GFE)

Refers to prostitutes who could make the experience feel like a consensual relationship with no money involved.

Action Fraud

Reporting service that enables citizens and businesses to file reports of fraud online or via phone and obtain information about how to better protect themselves from being victimized

Endangered Child Alert Program (ECAP)

Seeks to identify the adults featured in some child exploitation content so that they may be brought to justice

Advance fee email schemes

Sender requests a small amount of money up front from the recipient in order to share a larger sum of money later

U.S. Customs and Border Protection (CBP)

Serve a pivotal role in the identification of attempts to smuggle in cash and currency as well as use or transfer fraudulent documents

Federal Trade Commission (FTC)

Serves as a key reporting mechanism for consumer complaints of identity crimes through both an online and telephone-based reporting mechanism.

Illegal content

Sex between animals and humans, rape/physical harm, and images featuring children and minors

Beastiality

Sex with animals,

necrophilia

Sex with the dead

Torrent

Sharing allows for concurrent uploads and downloads of media through multiple sources

Crimeware

Software tools built with the purpose of committing online scams and stealing information from consumers and businesses

Identity fraud

Someone else's personal information is used by another individual in order to obtain money, credit, goods, or services, and may be used to enable other forms of fraud, such as mortgage fraud.

Internet Crime Complaint Center (IC3)

Staffed by both FBI agents and professional staff with expertise in the prevention, detection, and investigation of cybercrime and also partners with industry representatives and local/state/federal law enforcement agencies to understand the scope of various forms of online fraud.

Low-tech

Taking PII out of mailboxes and trash cans or during the commission of a robbery/burglary

Internet Crimes Against Children (ICAC)

Task forces provide a mechanism for coordination between local, state, and federal law enforcement as well as prosecutors.

Prosecution

The Government

Defendant

The accused / Private party

identity Theft

The attempted or successful misuse of an existing account, such as a debit or credit card account, the misuse of personal information to open a new account or the misuse of personal information for other fraudulent purposes, such as obtaining government benefits or providing false information to police during a crime or traffic stop

Payload

The changes that a piece of malware causes to a computer system are affected

Technology as a Target

The computers and mobile devices we use every day can be targeted by offenders to cause harm to information or people

Fraud

The criminal acquisition of money or property from victims through the use of deception or cheating

Technology as Evidence

The devices we use produce digital evidence of our activities, Digital evidence can be used to support criminal investigations of virtually any offense, online or offline

Laws Dealing with Malware

The fifth statue of the U.S. Computer Fraud and Abuse Act (CFAA) involves the use of malware, making it illegal to: knowingly cause the transmission of a program, information, code, or command and thereby intentionally cause damage to a protected computer - intentionally access a protected computer without authorization and thereby recklessly cause damage - intentionally access a protected computer without authorization and thereby cause damage or loss

Protection of Children Against Sexual Exploitation Act

The first U.S. law criminalizing child porn and was enacted in 1977 - makes it illegal for anyone under the age of 16 to participate in the visual production of sexually explicit materials, however, this definition was extended to the age of 18 in 1986

Protection of Children Act 1978 (PCA)

The first attempt to legislate against child porn making it illegal to obtain, make, distribute, or possess an indecent image of anyone under the age of 18.

Canadian National Child Exploitation Coordination Centre (NCECC)

The focal point of contact for online exploitation cases that cross jurisdictional boundaries within Canada or internationally

Digital Piracy

The illegal copying of digital media (e.g., computer software, digital sound and video recordings, etc.) without the explicit permission of the copyright holder

Immigration and Customs Enforcement (ICE) - Child porn terms

The importation/distribution of child porn and obscene content through U.S. borders, electronic or otherwise, are an investigative priority for ICE agents.

Prostitution

The practice of paying for sex

The Fappening / Celebgate

The release of illegally acquired photos and videos of multiple celebrities on August 31, 2014

Pornography

The representation of sexual situations and content for the purposes of sexual arousal and stimulation - Legal in the U.S. and most Western nations so long as the participants (or those depicted) are of legal age

Romance Scams

The scammer attempts to develop an emotional relationship that will culminate in the scammer traveling to victim

Pump and Dump Stock Schemes

The scammer's objective is to artificially "pump up" the price by enticing individuals to purchase the stock. The scammer then sells "dumps" their investment in the stock in order to garner a profit before the value drops

Hacker Subculture: Secrecy

The use of nicknames or handles provide hackers with a way to represent themselves in the digital world, Many handles are ideal concepts or a projection of the hacker's attitudes, Allows hackers to conceal their real identity, Some hackers also attempt to segment themselves and to shield their activities from the general public through the use of closed web forums and private message boards.

Hacker Subculture: Knowledge

There are a range of terms used to reference a hackers' skill and level of knowledge

Stored communications

This statute makes it an offense to either intentionally: access without authorization a facility through which an electronic communication is provided; or exceed an authorization to access such a facility and then obtain, alter, or prevent authorized access to a wire or electronic communication while it is in electronic storage

.xxx domain

Top-level domain that provides a voluntary option for individuals to host pornographic content online.

Traders

Trafficking child porn

Child Victim Identification (CVIP)

Trawls through images of child porn in order to determine the identity and location of child victims

United Kingdom's Computer Misuse Act of 1990

Unauthorized access to computer material, Unauthorized access to a computer system with intent to commit or facilitate the commission of a serious crime, Unauthorized modification of computer material

Age Verification Services (AVS):

Upon entry into the website verify the age of an individual via a valid credit card/driver's license

COPINE (Combatting Paedophile Information Networks in Europe) Scale

Used to categorize sexual content on the basis of the harm involved in erotica and pornographic content involving children.

Child love

Used to describe what they perceive to be a perfectly normal relationship between adult and child, which doesn't have to always involve sexual activity.

"Cash out" services

Used to obtain physical money from electronic accounts by hijacking these accounts to engage in electronic fund transfers established by a hacker

Private fantasy

User creates their own materials so that they can use it for personal reasons later.

Browsers

View child porn accidentally, but save the content deliberately for later use

Macro Viruses

Virus writers create a program using the macro programming languages associated with specific applications and embed the code into the appropriate file (e.g., PowerPoint presentation).

Types of Malware

Viruses, trojan horses, worms, blended threats

BigDoggie and Punternet

Websites where individuals can post reviews of their experiences with sex workers

Police Intellectual Property Crime Unit (PIPCU)

Works as an independent group designed to handle serious forms of IP crime in London

Worms

Worms are malware that uses system memory to spread, self-replicate, and deteriorate system functionality, spread autonomously, takes up memory space and network resources, They do not deliver a payload

Code-Red worm

affected any web server using Microsoft's IIS web server software - spread rapidly around the world - caused a Denial of Service (DoS) attack due to its constant replication and spreading attempts

Convention on Cybercrime (CoC)

deals with child porn under Article 9 requiring member states to make it illegal to produce, distribute, offer, procure, or possess child pornography via computer or media storage

Digital Millennium Copyright Act (DMCA) of 1998

designed to directly affect media piracy online through further revisions to the Copyright Act- extended protection to various music and performances that have been recorded in some fashion - makes it illegal to circumvent any protective technologies placed on copyrighted works - makes it illegal to tamper with copyright management software or protections - can be extended beyond computer software

Cybercrime Markets: Trust

forums utilize checks to ensure that products are reliable and trustworthy, guarantor programs serve as a specialized payment mechanism to deal with individuals who may or may not be trustworthy, positive feedback/reviews made within forums help to demonstrate the trustworthiness of the individual

No Electronic Theft (NET) Act of 1997

increased penalties for the duplication of copyrighted materials, recognizes infringement when an individual receives or expects to receive a copyrighted work, including through electronic means, regardless of whether they received commercial/financial gain - introduced sanctions for the reproduction/distribution of one or more copies of "phonorecords" making it possible to legally pursue music piracy

Groomers

may not access child porn, but if they do they're more likely to share it with their intended target to normalize the notion of a sexual activity. They are dependent on the steps their victims take in order to minimize their risk of getting caught

Cyberterror

involves the use of digital technology or CMCs to cause harm and force social change based on ideological or political beliefs

Trojan Horses Functions

keystroke logging, access to sensitive files, use of the webcam or other system tools, use of the infection system for attacks against other systems, send additional forms of malware to the system to engage in secondary infections.

The Pirate Bay (TPB)

maintains indexed torrent files for music, software, video games, and newly released movies.

U.S. Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE)

nvestigate and seize imported goods that infringe existing intellectual property rights

Federal Bureau of Investigation (FBI)

prosecutes active investigations against piracy groups

Computer Emergency Response Teams (CERTs) or Computer Security Incident Response Teams (CSIRTs)

provides reporting mechanisms for vulnerabilities and threats to systems as well as security tools to help patch and protect systems - serves to analyze and track threats as they evolve for virtually any branch of government and civilian networks - act as a focal point for the coordination of information concerning cyber attacks that threaten critical infrastructure

"Secret Shopper" scheme

the sender or fake company indicates that they are seeking people to shop at specific retailers to review the store's procedures and customer service - once "hired," the recipient is given a check/money to purchase certain goods and keep a portion of the check for compensation - once the products are bought and a review of them is made, they are asked to ship the products to a specified location

Carnegie Mellon Report

ver 80 percent of images on the Internet involved sexually explicit content, which led to tremendous coverage in major news outlets about the threat of cyberporn.

Cybercrimes occure

when a perpetrator uses special knowledge of cyberspace to commit a crime

Digital Natives

young people who have grown up using the internet and social networking


Related study sets

CH 11 - DEVELOPING AND MANAGING PRODUCTS

View Set

The Voyage of the Dawn Treader Chapter 1 Questions

View Set

Reading: When the Referee Sees Red...

View Set

cop2000 quiz 6, cop2000 quiz 7, cop2000 quiz 8

View Set

Capitulo 5 Vocab (P. 101, 102, 111)

View Set

Exam 2-chapter 8 practice questions

View Set

Chapter 16 Bedside Assessment of the Patient

View Set

CLU- Life Insurance Intro Practice Exam questions

View Set

Smartbook Share-Based Compensation and EPS (1 of 4), (2 of 4), (3 of 4), (4 of 4)

View Set