Computer Crime, Attack Methods, and Cyber-Incident Response Flashcards
Who commits cyber-crimes?
Nation-states and spies: some foreign nations. CHINA? RUSSIA??
Industrial spies- seek intellectual property and trade secrets for competitive advantage
Organized crime- blackmails that threaten to harm data resources
Hacktivists- social or political statements
Hackers and crackers: for fun and challenge
What are four categories of computer crime?
1) Computer or system as target- denial of service (DOS) attacks and hacking
2) Computer as subject- unlawful access to attack others
3) Computer as tool- unauthorized access by breaches, phishing, key loggers
4) Computer as symbol- variation on computer as tool. Deceive user to obtain access.
How do we prevent and detect crime?
Make crime harder
Increase cost
Improve detection methods
Reduce loss
What are computer attack methods?
1) Back door: Software allowing unauthorized entry to system by omitting logon. Once common among programmers to facilitate development.
Once criminals get in, they will install a backdoor, so they can get in without having to worry about passwords being changed
2) Denial of Service Attacks- Prevent legitimate users accessing system
Flood server with incomplete access requests
often use botnets (zombie computers)
3) Eavesdropping - Unauthorized interception of private communication.
4) Email bombing or spamming- Sending thousands or millions of emails to an address.
5) Logic bombs- Program planted in system dormant until event or time (date, employee delete from active status) 0 will destroy software or data at a specific time
6) Malware- exploit system and user vulnerabilities to gain access or damage computer. Unauthorized program that copies itself, may damage data. Worm replicates across systems. Sending email floods
- Virus and Spyware detection software is essential
7). Trojan house- program hidden inside benign file, can insert back door into system
8) Packet analyzers, network analyzers, and sniffers
- Have network control (legitimate and data capture uses
Packet= formatted block of data carried by a computer network
Packet Sniffing= capture packets of data as they move across the network
9) . Man in the middle attack - Hacker impersonate sender or receiver. Relies on attacking mutual authentication.
9) Password crackers- Generate potential password and test to gain access. Finds weak password easily.
10) Identity and authenticity risks: Hacker mimics legitimate user. Pretending you’re someone else
11) Salami Fraud (slicing)- Favorite of movie plots- take a digit from a tiny calculation and add them to some account.
12) Social engineering- Tricking employees. Physical or logical
- Fishing: Spoofed email and fraudulent websites
- Fool recipients into divulging personal financial data such as credit cards
13) Spam- Irrelevant or inappropriate email (or text or whatever messaging system comes next) messages sent to either :
- A large number of recipients
- The same recipient many times (email bombing)
14) War chalking, driving, and walking
- War chalking- Draw symbols in public places to indicate amiable wi-fi networks
- War driving- seeking access to Wi-Fi while driving
- War waking- Seeking assess to Wi-Fi while driving, may lead to war chalking
- A violation of organizations security policy
- Response based on organizational protocol