Computer Crime, Attack Methods, and Cyber-Incident Response Flashcards
Define “Trojan horse”.
A malicious program that is hidden inside a seemingly benign file.
Define “packet sniffers”.
Programs called packet sniffers capture packets of data as they move across a computer network. Packet sniffing has legitimate uses jot monitor network performance or troubleshoot problems with network communications. However, it is often used by hackers to capture user names an passwords, IP addresses, and other information that can help the hacker break into the network. Packet sniffing a computer network is similar to wire tapping a phone line.
Define “worm”.
Similar to viruses except that worms attempt to replicate themselves across multiple computer systems. They generally try to accomplish this by activating the system’s email client and sending multiple emails.
What is a back door attack on a system?
A software program that allows an unauthorized user to gain access to the system by side-stepping the normal logon procedures. Back doors were once commonly used by programmers to facilitate access to systems under development.
Define session hijacking or masquerading.
This occurs when an attacker identifies an IP address (usually through packet sniffing) and then attempts to use it to access a network. If successful, the hacker has “hijacked” the session, i.e., gained access to the session by pretending to be another user.
Define “denial of service attacks”.
An attack that attempts to prevent legitimate users from gaining access to the system. These attacks, called denial of service attacks, are perpetrated by flooding the server with incomplete access request.s
What is a logic bomb attack on a system?
An unauthorized program which is planted in the system. The logic bomb lies dormant until the occurrence of a specified event or time (e.g., a specific date, the elimination of an employee from “active employee” status, etc.).
Define “malicious software (malware).
Programs that exploit system and user vulnerabilities to gain access to the computer. There are many types of malware.
Defines the four types of computer crimes.
- Computer as target
- Computer as subject
- Computer as tool
- Computer as symbol
Define “virus”.
An unauthorized program, usually introduced through an email attachment, which copies itself to files in the users system. These programs may actively damage data, or they may be benign.
Define “password crackers”.
Password cracking software generates and tests a large number of potential passwords to try to access a system.