CYBERCRIME Flashcards

1
Q

what is cyber crime?

A
  • criminal groups target individuals, groups + large corporate networks to steal personal info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cyber crime against consumers

A
  • phishing
  • webcam manager
  • file hijacker
  • key logging
  • screenshot manager
  • ad clicker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cyber crime against business

A
  • hacking

- distributed denial of service (DDOS) attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Holt et al (2015) - hacking

A
  • not necessarily a crime
  • can be applied in many ways depending on ethical perspective of actor
  • modification/alteration of computer hardware/software to enable tech to be used in new way
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Brenner (2008) - hacking

A
  • most common targets —> individual computer users, private industry and governments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Holt et al. (2015) - phishing

A

attempts to obtain sensitive financial info from victims to engage in identity theft and fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bergh + Junger (2018) - prevalence

A
  • annual crime prevalence rates ranged from 1-6% for hacking
  • estimates for being a victims of malware - 2-15%
  • hard to estimate due to variation in methods and questioning between countries
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

crimes and offences

A
  • antisocial behaviour (ASB)
  • theft and fraud
  • hate crime
  • exploitation
  • terrorism and hacking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EU commission

A

general policy on the fight against cyber crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

legislation relating to ICT crime

A
  • computer misuse act 1990
  • communications act 2003
  • digital economy act 1959
  • data protection act 1998
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

technology and policing - overarching issues

A
  • question of balance - liberty vs. security
  • current narratives mirror some historical concerns —> links between control of communication systems and exercise of power (Innish, 1950)
  • surveillance discourse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

technology and policing - listening, watching, sensing and tracking

A
  • profound ability to monitor has been reluctant in claim that surveillance society has emerged (Lyon, 2007)
  • full spectrum surveillance through digitization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

methods employed by the state often similar in character to those employed by others such as:

A
  • legitimate parties —> consumer surveillance (e.g. cookies)
  • illegitimate parties —> individual offenders and serious organised crime (e.g. hacking, identity theft, fraud and trolls)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

hot products targeted by theives are generally: (Clarke, 1999)

A
  • Concealable
  • Removable
  • Available
  • Valuable
  • Enjoyable
  • Disposable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Newman + Clarke (2003) - internet as a criminogenic environment

A
  • Stealth
  • Challenge
  • Reconnaissance
  • Escape
  • Multiplicity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

worthley + smallbone (2006)

A
  • child sexual abuse in new tech

- fundamental principle of SCP is that crime follows opportunity

17
Q

responsibility of cybercrime prevention?

A
  • education/awareness
  • online content providers - place managers (Eck, 2003)
  • online users + supervision of users (e.g. individual users, parents and guardians)
18
Q

reducing opportunities through SCP

A
  • rational choice theory (Clarke + Cornish, 1985)

- crime pattern theory (Brantingham + Brantingham, 1993)

19
Q

preventions of what?

A
  • email
  • blog
  • social networking sites
  • message boards/forums
  • online dating sites
  • messaging services
  • text messages
  • video mesages
  • chat rooms
20
Q

Eddosl (2016)

A
  • success of internet based software masked the fact that there are many security flaws
21
Q

risk management

A
  • understand what makes organisation attractive to cyber criminals and main vulnerabilities
  • only 37% if companies have cyber incident response plan
22
Q

Buono (2014)

A
  • strategic intelligence/analysis is vital in fight against cyber crime —> data gatherin