Computer Misuse Flashcards

1
Q

What are the 3 classifications of computer hackers?

A

1) apprentice hackers;
2) journeyman hackers;
3) master hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an apprentice hacker?

A

Minimal technical skills and relies on attack toolkits — a “script kiddie”.
These hackers are responsible for the highest volume of
attacks, but their attacks are easiest to defend against.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a journeyman hacker?

A

A journeyman hacker has sufficient skills to modify an attack toolkit, or to construct something similar.
These hackers are responsible for a smaller volume of attacks, but their attacks are harder to defend against.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a master hacker?

A

A master hacker has sufficient skills to create entirely new attack toolkits.
These hackers are responsible for a small volume of attacks, but their attacks are very difficult to defend against (zero-day vulnerabilities)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What did a hacker used to be?

A

Traditionally, a “hacker” was a creative programmer who was fascinated by computers and wrote clever programs — a “good hack” was an especially clever piece of code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What 3 offences did the Computer Misuse Act 1990 create?

A

1 unauthorized access;
2 ulterior intent;
3 unauthorized modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is unauthorized access?

A

Causing a computer to perform any function with intent to gain access to any computer,
the access secured is unauthorized,
he or she is aware that the access is unauthorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ulterior intent?

A

When someone is guilty of unauthorized access; and

the unauthorized access was made with the intention of committing a further offence. (i.e. stealing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is unauthorized modification?

A

When someone carries out any act which results in unauthorized modification of material on any computer, and he or she does so with “requisite intent” and “requisite knowledge”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 properties of malware?

A

∙ is attached to some host software;
∙ carries out some malicious act;
∙ propagates by attachment to some other host software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is catfishing?

A

A catfish pretends to be someone they are not online, in order to lure someone they have never met into a relationship.
A catfish may steal someone else’s photos, videos or personal information to create a fake profile or website when they are forming their bogus identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly