Computer Crime, Attack Methods, and Cyber-Incident Response Flashcards

1
Q

Define “Trojan horse”.

A

A malicious program that is hidden inside a seemingly benign file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define “packet sniffers”.

A

Programs called packet sniffers capture packets of data as they move across a computer network. Packet sniffing has legitimate uses jot monitor network performance or troubleshoot problems with network communications. However, it is often used by hackers to capture user names an passwords, IP addresses, and other information that can help the hacker break into the network. Packet sniffing a computer network is similar to wire tapping a phone line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define “worm”.

A

Similar to viruses except that worms attempt to replicate themselves across multiple computer systems. They generally try to accomplish this by activating the system’s email client and sending multiple emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a back door attack on a system?

A

A software program that allows an unauthorized user to gain access to the system by side-stepping the normal logon procedures. Back doors were once commonly used by programmers to facilitate access to systems under development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define session hijacking or masquerading.

A

This occurs when an attacker identifies an IP address (usually through packet sniffing) and then attempts to use it to access a network. If successful, the hacker has “hijacked” the session, i.e., gained access to the session by pretending to be another user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define “denial of service attacks”.

A

An attack that attempts to prevent legitimate users from gaining access to the system. These attacks, called denial of service attacks, are perpetrated by flooding the server with incomplete access request.s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a logic bomb attack on a system?

A

An unauthorized program which is planted in the system. The logic bomb lies dormant until the occurrence of a specified event or time (e.g., a specific date, the elimination of an employee from “active employee” status, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define “malicious software (malware).

A

Programs that exploit system and user vulnerabilities to gain access to the computer. There are many types of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Defines the four types of computer crimes.

A
  1. Computer as target
  2. Computer as subject
  3. Computer as tool
  4. Computer as symbol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define “virus”.

A

An unauthorized program, usually introduced through an email attachment, which copies itself to files in the users system. These programs may actively damage data, or they may be benign.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define “password crackers”.

A

Password cracking software generates and tests a large number of potential passwords to try to access a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly