Exam 4 - Cyberdeviance Flashcards
What are the types of computer crimes?
DDoS
Hacktivism
Harassment/Threats of Violence
Identity Theft/Account Takeovers
Investment Crimes
Lottery/Sweepstakes crimes
Malware/Scamware crimes
Phishing
Ransomware attacks
Social Media Fraud
Tech Support fraud
What country ranks first in cybercrime?
America
What are the four broad types of cybercrime?
- Computer as the target
- Computer as the instrument of crime
- Computer as incidental to other crimes
- Crime associated with the prevalence of computers
Computers as the Target
- Someone makes use of a computer to obtain info or damage operating programs
- Ex. Altering, theft or sabotage of intellectual property, theft of marketing info, blackmail based on stolen info.
What are the two forms of ‘computer as target’ offenses?
- Technovandalism - Involved malicious intent but is often motivated by the offender’s need to show they are capable of doing it (ego)
- Technotrespass - Unlawful exploration of computer files just to look at contents, not damage, steal or alter any information
Computers as Instruments of Crime
- Instrumentality - The use of an instrument, legally in one’s possession, to commit a crime
Ex. Theft from bank accounts, credit card fraud, fraud stock market trans.
Computers as Incidental to Other Crimes
- Computer is not necessary to commit a crime but facilitates its commission
- May accelerate the commission of certain offenses
- Examples. Bookmaking, money laundering, altering records, unlawful bank trans.
Crimes Associated with the Prevalence of Computers
- Proliferation of counterfeit equipment and software
-Ex. copyright violations, duplication of programs
Types of ‘Crimes Associated with the Prevalence of Computers’
- Unauthorized computer use (Computer voyeurism, changing data, deleting data)
- Malicious Computer Programs (Viruses, worms, trojans)
- Harassment and Stalking (Threats of injury, sexual innuendo, hate messages)
What are Trap Doors?
- Backdoor access points in software to allow programmer to make changes easily
- If left in program after installation, intentionally or unintentionally, can lead to offender gaining ready access to system programs and files
What are trojan horses?
Method for infiltrating computer systems with the intent to disable.
- Carries instructions that are disguised as authorized and useful
What are Viruses?
- Computer programs with the ability to reproduce themselves
- Alters a computer program by adding commands that will activate the virus
- May alter or destroy data, render disk space or memory unstable
- May infect computers through email or infected file download
What are worms?
- Computer programs that exist independently of other programs and can replicate
- Typically more powerful than a virus
What are logic bombs?
- Instructs computer to execute a certain function under certain conditions, usually on a given date and time
- Often planted on a system using a trojan horse.
What are the types of Cyberdeviance?
- Hackers
- Crackers