computer and internet crimes Flashcards

1
Q

Levin reportedly accomplished the break-ins by dialing into Citibank‘s cash management system. This system allowed clients to initiate their own fund transfers to other banks.

A

Citibank and Vladimir Levin (June-October, 1994)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It is a computer virus discovered in 2012 that attacks computers running the Microsoft Windows operating system. It is also known as Disttrack. Shamoon is capable of wiping files and rendering several computers on a network unusable.

A

Shamoon (2012)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a self-replicating program that spreads by inserting copies of itself into other executable code or documents.

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is a virus that uses an application‘s own macro programming language to distribute itself.

A

macro virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a derogatory term for inexperienced crackers who use scripts and programs developed by others for the purpose of compromising computer accounts and files, and for launching attacks on whole computer systems.

A

script kiddie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

are people who are not only capable of writing scripts to exploit known vulnerabilities, but also capable of discovering new ones.

A

Elite hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

conducted against information and information processing equipment used by an adversary

A

Information Warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is a protection of networks and their services from unauthorized modification, destruction, or disclosure, and provision of assurance that the network performs its critical functions correctly and there are no harmful side-effects.

A

Network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The original goal of computer and network security is to provide (3)

A

confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

refers to the security principle that states that information should not be disclosed to unauthorized individuals.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is the security principle that requires information to not be modified except by individuals authorized to do so.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

applies to hardware, software, and data. All of these should be present and accessible when the subject (the user) wants to access or use them.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

deals with the desire to ensure that an individual is who they claim to be.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a concept that complements the idea of various layers of security.

A

Diversity of defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is an approach which puts human needs and capabilities at the focus of designing technological systems.

A

Ergonomics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

make it possible to commit unethical acts quickly.

A

Time Information systems

17
Q

Ensures access of individuals to personal data collected about them and about government activities in federal agency files.

A

Freedom of Information Act of 1970.

18
Q
  • General prohibition on pen register and trap and trace device use
  • Pen Registers and Trap and Trace Devices
  • Standards against fraud by wire, radio, or television
  • Standards against Interception and disclosure of wire, oral, or electronic communications prohibited
  • Wire and Electronic Communications Interception and Interception of Oral Communications
A

mail fraud law

19
Q

is a person who enjoys computer technology and spends time learning and using computer systems.

A

hacker

20
Q

also called a ???, is a computer-savvy person who attempts to gain unauthorized or illegal access to computer systems. In many cases, they are people who are looking for fun and excitement – the challenge of beating the system.

A

A criminal hacker; cracker

21
Q

The following are the four (4) unique INFORMATION SYSTEM attributes:

A

● Location
● Time
● Separation of Act from Consequences
● Individual Power

22
Q

There are basically three overlapping types of Risks:

A
  • bugs/misconfiguration problems
  • browser-side risks
  • interception of network data (via network eavesdropping)
23
Q

Bugs or misconfiguration problems that allow unauthorized remote users to: (4)

A

● Steal confidential documents
● Execute commands on the host machine, allowing them to modify the system
● Gain information about the host machine, allowing them to break into the system
● Launch denial-of-service attacks, rendering the machine temporarily unusable

24
Q

Browser-side risks, including: (2)

A

● Active content that crashes the browser, damages the user’s system,
● The misuse of personal information