crime type 2 - cybercrime Flashcards

1
Q

What are some examples of cyber crime? 10 examples

A

• Malware: viruses and ransomware
• Cryptojacking
• Data breach
• Distributed DoS attacks (DDoS)
• Phishing and spear-phishing
• E-commerce frauds
• Cyberespionage
• Selling illegal items online
• Soliciting, producing, or possessing child pornography.
• Using encrypted apps to organize a robbery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define cyber dependent

A

Offences that can only be committed by using a computer, computer networks or other ICT
- spread of viruses
- distributed denial of service attacks (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define cyber enabled

A

Traditional crimes that are increased In their scale or reach by using a computer, computer networks or other ICT
- phishing emails
- selling drugs on crypto markets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

define cyber assisted

A

To assist the commission of traditional crimes (e.g. to gather information or to communicate)
- use of encrypted apps to communicate between co-offenders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is malware?
Examples

A

Software designed to interfere with a computers normal functioning
- blanket term for viruses, trojans and other destructive computer programs
Examples:
- ransomware
- botnets
- Trojans
- worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is cryptojacking?

A

Cryptojacking is the act of hijacking a computer to mine cryptocurrencies against the users will, through websites, or while the user is unaware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is data breach?

A

A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is distributed denial of service attacks?

A

In a distributed denial-of-service (DDoS) attack, multiple compromised computer systems attack a target and cause a denial of service for users of the targeted resource. The target can be a server, website or other network resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is phishing?

A

The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is spear phishing?

A

While phishing attacks target anyone who might click, spear phishing attacks try to fool people who work at particular businesses or in particular industries in order to gain access to the real target: the business itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are e commerce frauds?

A

when scammers intercept a commercial transaction on a ecommerce store with the goal of personal or financial gain
- also known as payment fraud, in which scammers steal money from either the customer, the merchant or both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is cyberespionage?

A

-type of cyberattack in which unauthorised user attempts to access sensitive or classified data or intellectual property for economic gain, competitive advantage or political reasons
- its the intention of stealing data, info, or intellectual property from or through computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

why do criminals use encrypted apps?

A
  • encryption allows you to communicate in secrecy through open forum such as computer bulletin boards and internet websites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

list 3 types of targets of cybercrime and what type of attacks will affect them

A
  1. individual users
    - more likely to be victims of minor cyberattacks e.g. online harassment
  2. corporate
    - suffer more serious crime e.g. DDos attacks
  3. states
    - life threatening attacks against critical infrastructures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

list 3 types of cybercrime associated with machines/computers

A
  1. crimes against the machine/ computer integrity
    - viruses
    -DDoS
  2. crime using machines
    - phishing
  3. crime in the machine
    - illegal pornographic material
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how do we measure/ count cybercrime?

A
  • police recorded crime
  • victimisation surveys
  • vendor databases
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

why is there underreporting in police recorded crime?

A
  • not perceiving that what had taken place was a crime
  • individuals not realising that they are victims of cybercime
  • not knowing where to report
  • believing that the police cannot do anything
  • embarrassment (romantic scams, sexual offending against children, online harassment)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

does police recorded crime distinguish between online and offline?

A

it does not

19
Q

between 2007 and 2012 how many people were prosecuted for computer misuse act?

A
  • 88 sentenced
  • 101 prosecuted
20
Q

what are 3 key features of the computer misuse act?

A
  • hacking
  • creation and distribution of malware
  • other instances of computer misuse
21
Q

what is cybercrime often registered as?

A

fraud

22
Q

what are the main vectors of payment fraud?

A
  • phishing
    -social engineering
23
Q

what significantly impacted online fraud?

A

covid19

24
Q

what is helping dark web users thrive?

A

grey infrastructures

25
Q

what do dark web users use as communication channels or to bypass market fees?

A
  • telegram
    -wickr
26
Q

child sexual abuse material has increased considerably using what?

A

-social media
-online gaming platforms
- P2P networks
-dark web

27
Q

what are ransomware programmes doing?

A
  • using supply chain attacks to compromise the networks of large corporations and public institutions and utilise new multi layered extortion methods
28
Q

why has mobile malware become a scalable business model?

A
  • by introducing overlay attacks, two-factor authentication disruption, and SMS spamming capabilities
29
Q

what do crime victimisation surveys do?

A
  • focus on organisations or individuals
  • focus on the just ‘known’ victimisation
  • also capture data about the impact and response of cybercrime : e.g. financial losses, anxiety about future cyberattacks, length of system downtime, repetitional damage
  • businesses: might be reluctant to report experience of cybercrime (reputational damage)
30
Q

what is the most common types of phishing messages?

A
  • delivery companies
  • bank building society
  • ecommerce company
  • government services
31
Q

where is the most voluminous data on ecrimes found? what are they not?

A
  • from vendors
  • these are not surveys
32
Q

what do vendors data focus on?
give 3 examples

A

focus on breaches that are technologically measurable by vendor specific software, such as:
- botnet
- spam
-viruses

33
Q

who is kevin mitnick?

A
  • AKA ‘the condor’
  • what he did: hacking into digital equipment corp, pacific bell etc
  • sentenced: tot of more than 5 years (8 months in solitary confinement)
    -where is he now? hes a cyber security expert, head of mitnick security consulting LLC
34
Q

who is michael calce?

A
  • AKA mafia boy
  • what he did: DDoS attack against yahoo, amazon, dell, ebay and CNN (at age 15, cost $1.2 billion)
  • sentence: 8 months in open custody
  • where is he now? he’s a writer and own optimal secure, a cybersecurity company
35
Q

cybercrime equal to offline crime has:

A
  • same motivation as offline crimes
  • theories general in conceputalisation
  • cyber crime in this instance is just crimes that happen to be online
36
Q

cybercrime not equal to offline crime is:

A
  • certain cybercrimes require acquiring knowledge/ skills
  • e.g. hacking, malware distribution
37
Q

rational choice theory

A
  • people committing crimes are rational actors
  • rational choice theory states that individuals have free will to choose between criminal or non-criminal behaviours
  • before committing crime the individuals weigh the costs and benefits of criminal behaviour vs legal behaviour
38
Q

deterrence theory

A

deterrence theory is a choice based theory that states people commit crimes when they expected benefits of committing a crime outweigh the likely costs of the crime

39
Q

routine activity theory and cybercrime

A
  • theory based on the assumption that crime can be committed by anyone who has the opportunity
  • cybercrimes rely on computer networks to connect motivated offenders with potential targets of victimisation in an absence of capable guardianship
40
Q

self control theory

A
  • theory about the lack of individual self control as main factor behind criminal behaviour
    -self control is the ability to avoid behaviours whose long term costs exceed immediate rewards
  • largely associated with many forms of crime, inclduing cybercrime:
    i. cyberbullying
    ii. cyber harassment
    iii. unauthorised computer use
41
Q

self control theory

A
  • theory about the lack of individual self control as main factor behind criminal behaviour
    -self control is the ability to avoid behaviours whose long term costs exceed immediate rewards
  • largely associated with many forms of crime, inclduing cybercrime:
    i. cyberbullying
    ii. cyber harassment
    iii. unauthorised computer use
42
Q

social learning theory
what does skinner say
what does bandura say

A

skinner = behaviours learned through positive and negative reinforcement
bandura = people learn behaviour from role models

43
Q

social learning in the cyberspace:

A

-differential association = online and offline friends involved in cyber activities
-steep learning curve = learn coding, procedures
- recognition in virtual communities

44
Q

neutralisation theory

A

delinquents use a series of justifications to neutralise their deviant behaviour
- minimising harm
- denial of victim
- denial of responsibility
- condemning the condemners
- appealing to higher loyalties