Cyber-Dependent Offenses Flashcards
These are the offenses that are strictly committed using information and communication technologies. … crimes target network systems and data confidentiality, integrity, and availability.
Cyber-dependent offenses
refers to someone manipulating a computer system or private network to access digital files or systems without proper authorization
Hacking
Hacking can be classified into five categories:
- Unauthorized access
- Modification of data
- Impairment of data
- Interception of data
- Misuse of assets
refers to gaining logical or physical entry to a network, data, website, program, or another system, without proper authorization or credentials.
Unauthorized access
refers to inserting, removing, or altering data without proper authorization
Modification of data
refers to disrupting the transmission or communication of data
Impairment of data
refers to unauthorized access and alteration in the data transmission between machines for personal and financial gain
Interception of data
refers to the unauthorized use of company files, systems, computers, and networks to damage the company’s properties.
Misuse of assets
These are the attacks that use computers against other computers or networks to modify, steal, or gain information through authorized access. An insider or an outsider can initiate an attack.
Cyber-attack
an attack from inside the security perimeter, also called “insider”
Inside attack
an attack from outside the security perimeter of the system, also called “outsider”
Outside attack
or malicious software- is software-based hacking and cyber-attacking tools.
Malware
This is designed to spread from one program to another, which can self-replicate. When a virus is executed, it replicates itself by changing other computer programs, documents, or boot sectors.
Virus
Unlike viruses, this standalone malware replicates itself without human intervention. It uses a computer network to spread itself by depending on the security failures of the targeted computer to access it.
Worm
.. horse or .. virus, appears as a legitimate program when downloaded to a computer. It can be found on file-sharing sites, email attachments, sketchy websites, and hacked Wi-Fi networks
Trojan