Computer Crime, Attack Methods, and Cyber-Incident Response Flashcards

1
Q

Who commits cyber-crimes?

A

Nation-states and spies: some foreign nations. CHINA? RUSSIA??

Industrial spies- seek intellectual property and trade secrets for competitive advantage

Organized crime- blackmails that threaten to harm data resources

Hacktivists- social or political statements

Hackers and crackers: for fun and challenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are four categories of computer crime?

A

1) Computer or system as target- denial of service (DOS) attacks and hacking
2) Computer as subject- unlawful access to attack others
3) Computer as tool- unauthorized access by breaches, phishing, key loggers
4) Computer as symbol- variation on computer as tool. Deceive user to obtain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do we prevent and detect crime?

A

Make crime harder

Increase cost

Improve detection methods

Reduce loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are computer attack methods?

A

1) Back door: Software allowing unauthorized entry to system by omitting logon. Once common among programmers to facilitate development.

Once criminals get in, they will install a backdoor, so they can get in without having to worry about passwords being changed

2) Denial of Service Attacks- Prevent legitimate users accessing system

Flood server with incomplete access requests

often use botnets (zombie computers)

3) Eavesdropping - Unauthorized interception of private communication.
4) Email bombing or spamming- Sending thousands or millions of emails to an address.
5) Logic bombs- Program planted in system dormant until event or time (date, employee delete from active status) 0 will destroy software or data at a specific time

6) Malware- exploit system and user vulnerabilities to gain access or damage computer. Unauthorized program that copies itself, may damage data. Worm replicates across systems. Sending email floods
- Virus and Spyware detection software is essential

7). Trojan house- program hidden inside benign file, can insert back door into system

8) Packet analyzers, network analyzers, and sniffers
- Have network control (legitimate and data capture uses

Packet= formatted block of data carried by a computer network

Packet Sniffing= capture packets of data as they move across the network

9) . Man in the middle attack - Hacker impersonate sender or receiver. Relies on attacking mutual authentication.
9) Password crackers- Generate potential password and test to gain access. Finds weak password easily.
10) Identity and authenticity risks: Hacker mimics legitimate user. Pretending you’re someone else
11) Salami Fraud (slicing)- Favorite of movie plots- take a digit from a tiny calculation and add them to some account.

12) Social engineering- Tricking employees. Physical or logical
- Fishing: Spoofed email and fraudulent websites
- Fool recipients into divulging personal financial data such as credit cards

13) Spam- Irrelevant or inappropriate email (or text or whatever messaging system comes next) messages sent to either :
- A large number of recipients
- The same recipient many times (email bombing)

14) War chalking, driving, and walking
- War chalking- Draw symbols in public places to indicate amiable wi-fi networks
- War driving- seeking access to Wi-Fi while driving
- War waking- Seeking assess to Wi-Fi while driving, may lead to war chalking
- A violation of organizations security policy
- Response based on organizational protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly