Chapter 2 Flashcards
Define cybercrime
A criminal offence committed through a computer or the Internet that causes loss or damage to the victims computer system, network, or data; denies access to data or service; or enable further related crimes, such as extortion or the resale of stolen data
Cybercrime has led to the amendments in the criminal code that make what activities illegal?
Using a computer without authorization
Making mischief in relation to data
Possessing a device to obtain telecommunications facility or service without authorization
Stealing telecommunication service
Explain malware
Short for “malicious software”, it is the tool most frequently used by cyber criminals to steal personal, financial, and business information, or disrupt computer networks
Explain denial of service attacks
Use malware to create botnets to build a network of computers that can be hijacked and controlled remotely
Explain ransomware
Attacks use malware to encrypt files on computers or networks and demand that the victim pay a ransom to obtain the decryption tool so the files can be released
Explain doxing
Criminals steal the data before any file description and then threatened to publish the information unless payment is made
Explain viruses and worms
These are standalone malware programs that self replicate and automatically spread to other computers. They are designed to exploit vulnerabilities and network server programs.
Explain Trojan horse
A Trojan horse can be used to create a back door and allow an infected computer to be controlled remotely
Explain social engineering
Criminals use psychological manipulation to achieve their goals. They may send the user upsetting or exciting information design to trigger an urgent response.
Explain phishing
An email that looks to be from a trusted source tricks the recipient into sharing personal information by email
Explain pharming
An email that looks to be from a trusted source direct users to a false website to enter their information
Explain watering holes
Criminals identify and infect websites that are likely to be visited by the individuals who they have targeted and infect their computer with malware if/when they visit
What are the direct losses associated with cyber losses?
Corporate espionage costs including ransom or extortion payments
Theft of intellectual property
Theft of funds
Theft of confidential information
Equipment damage costs
Opportunity cost
Regulatory penalties
Loss of key staff
What are the indirect losses associated with cyber losses?
Extra expenses
Accounting and other professional fees
Loss of competitiveness
Loss of business
Loss of supply
Loss of reputation
Loss of opportunity
Diminished employee productivity
Loss of certification
Litigation
After a cyber incident, what are the four categories under recovery costs?
Discovery- cost to detect a data breach or another type of compromise and companies network security intelligence
Investigation- cost to analyze evidence related to a cyber attack
Containment- cost to contain the cyber incident and prevent the attack from spreading
Recovery- affected computer systems can be put back in use