computer and internet crimes Flashcards
Levin reportedly accomplished the break-ins by dialing into Citibank‘s cash management system. This system allowed clients to initiate their own fund transfers to other banks.
Citibank and Vladimir Levin (June-October, 1994)
It is a computer virus discovered in 2012 that attacks computers running the Microsoft Windows operating system. It is also known as Disttrack. Shamoon is capable of wiping files and rendering several computers on a network unusable.
Shamoon (2012)
a self-replicating program that spreads by inserting copies of itself into other executable code or documents.
virus
is a virus that uses an application‘s own macro programming language to distribute itself.
macro virus
a derogatory term for inexperienced crackers who use scripts and programs developed by others for the purpose of compromising computer accounts and files, and for launching attacks on whole computer systems.
script kiddie
are people who are not only capable of writing scripts to exploit known vulnerabilities, but also capable of discovering new ones.
Elite hackers
conducted against information and information processing equipment used by an adversary
Information Warfare
is a protection of networks and their services from unauthorized modification, destruction, or disclosure, and provision of assurance that the network performs its critical functions correctly and there are no harmful side-effects.
Network security
The original goal of computer and network security is to provide (3)
confidentiality, integrity, and availability
refers to the security principle that states that information should not be disclosed to unauthorized individuals.
Confidentiality
is the security principle that requires information to not be modified except by individuals authorized to do so.
Integrity
applies to hardware, software, and data. All of these should be present and accessible when the subject (the user) wants to access or use them.
Availability
deals with the desire to ensure that an individual is who they claim to be.
Authentication
is a concept that complements the idea of various layers of security.
Diversity of defense
is an approach which puts human needs and capabilities at the focus of designing technological systems.
Ergonomics