Substantive Aspects of Cybercrime Law Flashcards
What are the three general categories of cyberattacks?
Cybercrime, cyberterrorism, and cyberwarfare.
What is cyberespionage?
State-sponsored theft of industrial and defense secrets or intellectual property.
What major international document addresses cyber warfare?
Tallinn Manual on the International Law Applicable to Cyber Warfare.
What is a botnet?
A network of hijacked computers used to perform cyberattacks, often without the owners’ knowledge.
What was the significance of the 2007 cyberattack on Estonia?
It demonstrated the potential of cyberattacks to disrupt national infrastructure and raised concerns about cyber warfare.
What is an Advanced Persistent Threat (APT)?
A sophisticated, long-term cyber intrusion aimed at espionage or sabotage, often state-sponsored.
What does a denial-of-service (DoS) attack do?
Overloads a target system with requests, making it inaccessible to legitimate users.
What is hacktivism?
Hacking with a political or social motive to raise awareness or protest.
What was the impact of the Stuxnet worm?
It targeted Iranian nuclear facilities, demonstrating how malware could be used for cyber warfare.
What are SCADA systems, and why are they vulnerable?
Supervisory Control and Data Acquisition (SCADA) systems manage industrial processes but were not originally designed with cybersecurity in mind, making them vulnerable to attacks like Stuxnet.
What makes attribution of cyberattacks difficult?
Cyberattacks often use anonymization techniques, botnets, and foreign jurisdictions, making it hard to trace the true perpetrators.
What was Operation Aurora?
A series of cyberattacks in 2009 targeting major companies, including Google, suspected to be linked to Chinese state actors.
What legal challenges exist in prosecuting cybercrime?
Difficulties include cross-border jurisdiction issues, lack of international agreements, and challenges in collecting digital evidence.
What is the Budapest Convention?
An international treaty that aims to harmonize cybercrime laws and enhance international cooperation.
What are the key tools used in cyberattacks?
Malware, phishing, botnets, DDoS attacks, keyloggers, spyware, trojans, viruses, worms, and more.
What is a web-based attack?
A web-based attack is a method used by threat actors to exploit web systems and services as threat vectors, often involving malicious URLs, scripts, or injected code to steal data or deliver malware.
What is formjacking?
Formjacking is an attack where malicious code is injected into online forms, often on e-commerce sites, to steal users’ payment and personal data.
What is a watering hole attack?
A watering hole attack is a strategy where cybercriminals compromise a commonly visited website to infect visitors with malware, targeting a specific group of users.
How do drive-by downloads work?
Drive-by downloads occur when a user visits a compromised website, triggering an automatic and often unnoticed download of malicious software.
What are browser exploits?
Browser exploits leverage vulnerabilities in web browsers or their plugins to execute malicious code, often leading to remote code execution.
What is the Cyber Kill Chain?
The Cyber Kill Chain is a framework developed by Lockheed Martin that describes the stages of a cyber attack, from reconnaissance to exploitation and control.
What is Magecart?
Magecart is a group of cybercriminals known for injecting skimming malware into e-commerce sites to steal payment card information.
What is the SLUB backdoor attack?
The SLUB backdoor is a malware campaign that exploited web-based collaboration platforms and messaging services like Slack and GitHub for command and control operations.
How are malicious URLs used in cyber attacks?
Malicious URLs trick users into clicking links that lead to phishing sites, malware downloads, or exploit execution.