PIC9-13 Flashcards
IBM’s Resource Access Control Facility (RACF)
very powerful main mainframe security utility available before remote access era
Cybercrime
criminal activity in which computers or computer networks are a tool, a target or a place of criminal activity
Computers as targets of cybercrime
- information acquisition
- control the system without authorization or payment
- alter integrity of data
- interfere with system availability (hacking or denial of service)
Computer as a storage device in cybercrime
use of computer as a passive storage medium
Computers as communication tools in cybercrime
traditional crimes committed online, e.g.:
illegal sales of drugs and arms online
Advanced fee fraud
promise of large sums of money if they provide relatively small payments upfront
Bots
piece of malware that carries out certain actions on receiving a command
DOS
denial of service attack
Hack
unauthorised entry to a computer, network or website
Phishing
trick to elicit confidential information
Social engineering
use of social factors to persuade a victims to reveal information of give money
Spam
bulk sending of emails ot other messages to users
commercial misuse
“black hat marketing”
Malware
program covertly inserted into another program:
- destroy data
- run malicious programs
- compromise confidentiality, integrity or availability of system, data, applications
classified by method of spread and payload (actions).
Trojan
malware that facilitates unauthorised access to system
Rootkit
malware that enables access while hiding its presence
Virus
malware that infects a host program and propagates
Worm
Malware that does not need a host program to propagate. infects via network, usb stick, etc…)
Zombie
Computer that has been compromised and is used to perform malicious tasks under remote control
Ransomware
criminal activity where a victim is held to ransom by cybercriminals:
- hacker asks for money in exchange of removing a malware
WannaCry
Ransomware attack to NHS in 2017 targeting Windows computers
Virus components
- infection mechanism
- trigger
- payload
Virus lifetime phases
- dormant
- propagation
- triggering
- execution
Cross site request forgery
sea surf
third party cookie setting, usually without the user being aware of it
Cloaking
SEO technique in which the content presented to the search engine spider is different to that presented to the user browser
Advanced Persistent Threat
- usually part of state security
- systematic and repeated cybercrime
- political or economic motivation
Sandworm
Russian Advanced Persistent Threat group responsible for hacker attack to Ukraine power grid in 2017
Stuxnet
Advanced Persistent Threat Attack to Iran’s nuclear plant
Computer Misuse Act 1990
Offences:
- Unauthorised access to computer material
- Unauthorised access with intent of further offences
- Unauthorised modification of computer material
EU Directive on Security of Network and Information Systems (2016)
first EU rules on cybersecurity
- improved cybersecurity capabilities
- increased EU-level cooperation
- risk management
Challenges in combatting cybercrime
- technology evolves fast and legislation becomes out of date
- malware evolved quickly
- individuals poor security practice
- Limitation of legislations on
cybercrime coming from abroad - difficulty to link anti-cybercrime initiatives across jurisdictions
- complexity of tech
- cooperation of law enforcement agencies internationally
- low investment in preventive tech
- unreported cybercrime to avoid bad publicity and liability