Cyber Crimes Exam1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/100

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

101 Terms

1
New cards

Malware

software that is designed to disrupt, damage, or gain access to unauthorized access to a computer system; virus, trojan horse, worm, spyware, adware

2
New cards

cybercrimes

Inspire fear in consumers & lead to a lack of trust in the security & safety of e-commerce .Present unique and difficult challenges to law enforcement & other governmental officials

3
New cards

Cyber

attached to a computer system

4
New cards

New Threats

Distribution of child pornography, financial crimes, corporate & governmental espionage, exploitation, stalking, identity theft

5
New cards

Insiders

Pose the greatest threat

6
New cards

Legislation & Law

are playing catch-up with technology; insufficient laws

7
New cards

Complications

there is a significant inconsistency in defining computer crime offenses, there is no systematic data collection procedure for cybercrimes, offenses vary greatly in character

8
New cards

Victimization

Increased use of computers, Increased availability of technical information on virus creation & computer hacking techniques

9
New cards

Carter’s Classification

computer as a target, computer as an instrument of a crime, computer as incidental to a crime, crimes associated with the prevalence of computers

10
New cards

Computer as Target

data alteration, network intrusion, computer vandalism, etc

11
New cards

Computer as Instrument

when the computer is used to gain some other criminal objective; theft, fraud, threats & harassment, bullying

12
New cards

Computer as Incidental

money laundering, criminal enterprise, child pornography, luring victims

13
New cards

Crimes Associated w computer

intellectual property theft, component theft, counterfeiting, identity theft

14
New cards

Type 1 Offenses

A single or discreet event from the point of view of the victim, involves use of malware, can be but not facilitated by computer software vulnerabilities.

15
New cards

Type 2 Offenses

Do not involve malware, generally involve repeated contacts or events from the point of view of the victim, do not usually involve the use of malware; cyberstalking, harassment, child predation, extortion

16
New cards

Hacker

No universal meaning, popular consensus is that they are bad people, establish their own sets of values which often conflict w the laws and values of greater society, 90% male, 80% under 30, 60% started early

17
New cards

Insider attack methods

Social engineering, authorized use of an orgs systems, bypassing security & control processes, compromised accounts

18
New cards

Crackers

a malicious hacker, there is no final authority on who determines when or how a hacker becomes this, no clear way to cross line back to hacker either.

19
New cards

Script Kiddies

often described as a scourge or pestilence on the internet, do not have enough skill to write their own programs or explore new exploits themselves, instead they download attack programs. primarily concerned with bragging & attacking each other or anyone else who draws their wrath

20
New cards

White Hat Hacker

ethical hacker; forms include: software testing by manufacturers, independent verification of software function & security, reverse engineering, training, bug bounty.

21
New cards

Tiger Teams

teams of hackers hired to “test” the defenses of an organization

22
New cards

Gray Hat Hackers

typically behaves in ethical manner, but sometimes violates accepted ethics. Accepted ethics include: do not profit from intrusion, do not intentionally harm a computer system, attempt to inform a system administrator of security flaws; “hackers are not bad guys, computer criminals are”

23
New cards

Black Hat Haters

cracker or malicious hacker; only network intrusion & other “hacker-like” activities committed in conflict w hacker ethics, quite open about their ideas, opinions, & technology. Most claim to benefit the systems they intrude upon bc they do not destroy data & alert system administrators to security flaws

24
New cards

Hacktivists

hackers that have come together to challenge the treatment of their peers by the government. use hacker skills & attitudes to convey a political message

25
New cards

The Internet of Things

anything that has a chip & connectivity, cell phones, household appliances, engines, industrial equipment, GPS Systems, cars

26
New cards

Social Norms

Technology, knowledge, commitment, categorization, law

27
New cards

Knowledge

hacker identity is built upon a devotion to learn & understand technology, most hackers are self taught

28
New cards

why?

Money, ideology, espionage, fun & thrill

29
New cards

Choice Theory

an individual commits a crime because he or she makes a rational choice to do so by weighing the risks & benefits of committing the act. When risks outweigh the benefits, the person will not commit the act. When the risk do not outweigh the benefits the person WILL commit the act

30
New cards

Routine Activities Theory (RAT)

based on rational theory. Developed by Lawrence Cohen & Marcus Felson. They argue that there is always a steady supply of offenders who are motivated to commit crime.

31
New cards

Factors for crime to occur

A motivated offender, a suitable target, the absence of a capable guardian

32
New cards

Capable Guardians

Anti-virus software, firewalls, cybersecurity teams, law enforcement

33
New cards

RAT; Online harassment

victims are vulnerable, attractive target, and in proximity

34
New cards

Deterrence Theory

argues that offenders commit crime bc they make a choice to do so. Based on perceived risks & benefits of committing the criminal act. If the risks outweigh the benefits, the offender WILL be deterred from the criminal act

35
New cards

General Deterrence

seeks to deter would-be offenders from committing criminal acts bc of the threat of punishment

36
New cards

Specific Deterrence

Designed to impose a sanction on a convicted offender in order to prevent him or her from continuing to commit criminal acts in the future

37
New cards

Cognitive Development Theory

assumes that individuals develop in a sequential manner

38
New cards

6 stages of moral development

punishment & obedience, Hedonistic Orientation, Interpersonal concordance, law and order orientation, social contract/legalistic, orientation to universal ethical principals

39
New cards

Personality Disorders

Psychologists argue that certain personality characteristics of an individual may influence crime; extroversion, impulsivity, lack of self-control, etc

40
New cards

Social Structure Theories

focus on why lower-class individuals are more likely to commit crime than middle-& Upper-class individuals

41
New cards

Strain Theory

saw crime as a result of a lack of opportunity, in particular economic opportunity; Goals vs. Means

42
New cards

Jurisdiction

Local, Federal, International

43
New cards

Merton’s 5 modes of Adaptation

Conformity, Ritualism, Innovation, Retreatism, Rebellion

44
New cards

General Strain Theory (GST)

developed by Robert Agnew, attempts to explain why individuals who feel stress & strain in their lives are more likely to commit crimes

45
New cards

Agnew; Negative Affective Stages

Anger, frustration, depression, disappointment, fear

46
New cards

Social Process Theory

Focus on the relationship between socialization & crime; analyze the impact of certain factors such as peer group relationships, family relationships, & failure in school on crime

47
New cards

Learning Theory

Individuals commit crime because they learn attitudes, skills, & rationalizations necessary to commit these acts, many times learning takes place w parents and peer interactions.

48
New cards

Sutherland: Differential Association Theory

argues that criminal behavior is a function of learning, not the inability to obtain economic resources

49
New cards

Hacker Subculture

provides context in which hackers situation their actions by rejecting goals & opportunities of the dominant culture. Social Hierarchy, Socialization, & Justifications

50
New cards

Spam Types

Commercial Electronic Mail, Email Scams, Sexually oriented material

51
New cards

CAN-SPAM Prohibits

the use of false or misleading header information, a “from” line that does not accurately identify any person who initiated the message; inaccurate or misleading identification…for purposes of disguising its origin; use of deceptive subject headings

52
New cards

CAN-SPAM Requires

a functioning email return address/other internet based response mechanism, commercial email messages be discontinued withing 10 business days after receipt of opt-out notification from recipient, clear & conspicuous notice of the opportunity to decline to receive further commercial email messages from the sender; and a valid physical postal address of the sender. Warning labels on commercial email messages containing sexually oriented materials

53
New cards

Sexual Content

Notice in the subject heading, links to content only, prior affirmatice consent

54
New cards

Fraudulent Email

Fines & or Imprisonment up to 5 years. Uses a protected computer to relay or retransmit multiple commercial electronic mail messages w the intent to deceive or mislead recipients or any internet access service, as to the origin of such messages.

55
New cards

Address Harvesting

Obtaining e-mail addresses using an automated means from an internet web site or proprietary online service operated by another person, where such service/person, at the time the address was obtained, had provided a notice stating that the operator of such web site or online service will not give, sell, or otherwise transfer electronic address.

56
New cards

Dictionary Attacks

Obtaining email address by using an automated means that generates possible email addresses by combining names, letters, or numbers into permutations

57
New cards

Hijacking

use of automated means to register for multiple email accts or online user accts from which to transmit, or enable another person to transmit, a commercial email that is unlawful

58
New cards

SMTP

Simple Mail Transfer Protocol

59
New cards

SPF

Standard Email Authentication Method. Source server IP belongs to the relevant domain

60
New cards

DKIM

Domain Keys Identified Mail, the message has a private key (hash) that matches with hash that we create using the public key that belong to the email domain and stored in DNS server, thus message is intact

61
New cards

DMARC

Domain Based message authentication, reporting, & conformance

62
New cards

Social engineering

Act of making other people take a action that may not be in their own best interest. Deception, manipulation, emotion/weakness, a deep knowledge of human vulnerabilities, Reconnaissance

63
New cards

Social Engineers

Hackers, Spies, Penetration Tester, Identity Thieves, Recruiters, Disgruntled Employees, Governments, Sales people

64
New cards

Common Attack Types

Customer service, couriers (to get identifying info, signature, gain entry into buildings), phone calls targeting employers, emails

65
New cards

Stages of Social Engineering

Information gathering, pretexting, elicitation, manipulation

66
New cards

Information Gatherting

Dumpster diving, social media, malware, shoulder surfing, watering hole

67
New cards

Manipulation

to influence someone to do something not in their best interest

68
New cards

Phishing

Email from friends, install malware, validating email addresses, getting money, directing to a fraudulent website, stealing credit card info, stealing online acct credentials

69
New cards

Colonial Pipeline Attack

attackers have gained access to an employee’s credentials through phishing attack

70
New cards

Akers: Social Learning Theory

Differential association, definitions, differential reinforcement, imitation

71
New cards

Techniques of Neutralization/ Drift Theory

process of becoming a criminal is a learning experience. Most criminals hold conventional values, norms, & beliefs, but must learn to neutralize the values before committing crime. Allow individuals to drift into criminality and then back into conventional behavior

72
New cards

Subcultural Theories

set of values, norms, & beliefs that differ from the dominant culture. Criminals including computer criminals hold values norms & beliefs that are in opposition to those held in domain culture. Attempted to explain gang formation & crime

73
New cards

Social Control theory

assumes that people will violate the law.

74
New cards

Self-control Theory

a person’s tendency to commit crime can be found in his or her level of self-control. Individuals who lack self-control are more likely to view online pornography & piracy

75
New cards

Karl Marx

Theorized that political change could not be achieved without conflict

76
New cards

Fanon

Justified the use of violence against oppressors

77
New cards

Computer Fraud & Abuse Act

Primary federal statute targeting unauthorized computer use, primarily focusing on unauthorized access & theft of information from computers. Protects any computer connected to a network

78
New cards

Economic Espionage Act

Impose criminal penalties on the theft of trade secrets. Either physically or electronically stored. Person stealing the trade secret must know the theft will cause economic loss & benefit another person. Applies anywhere in the world as long as the perpetrator is a U.S. citizen or company

79
New cards

Copyright Act

includes literary works, musical works, dramatic works, pantomimes & choreographic works, pictorial, & graphic works, motion pictures & audiovisual works, sound recordings & architectural works. Applies to computers typically involves software piracy but also has focused on downloading music & video files

80
New cards

Family Entertainment & Copyright Act

makes it illegal to record, photograph, or otherwise copy a motion picture or other protected work as it is presented or screened in a theater. Also criminalizes the distribution of copyrighted materials before they are released to the public for commercial profit

81
New cards

Title 18

Intentional access, without/exceeding authorization, to a facility providing electronic communication services, obtaining/altering data or preventing authorized access to others. Felony for commercial advantage, malicious destruction, private gain, or further another wrongful act.

82
New cards

Communication Interference

willful or malicious damage to interference to radio, telephone & other means of communication

83
New cards

State Cybercrime Laws

Threshold amts of monetary value, fraudulent/repeated crimes, prior convictions, sensitive data, data of sensitive agencies , traditional crimes-cybercrimes

84
New cards

Confidentiality

ensuring the secrecy of info that is meant to remain private. ex: cybercriminal that breaches a companies network and steals data

85
New cards

Integrity

ensuring that information cannot be altered or tampered with by unauthorized parties. Ex: employee who changes the company’s financial to give himself a bonus or hide a theft

86
New cards

Availability

ensuring that systems & info are available for use by those who need them & are authorized to use them such as employees, customers, & acct holders.

87
New cards

Administrative control

management tool such as procedure, policy, governance, structure, training.

88
New cards

Technical control

rule in software or hardware taht works to protect information & prevent unauthorized access

89
New cards

Physical Controls

protect physical locations where info and systems are accessible

90
New cards

Least privilege

doctrine that limits users to the access and abilities they need to do their jobs but no more than that

91
New cards

Incident Response

Preparation for an incident, Identification & detection of an accident, containment of a threat/attack, recovery & resumption of normal operations, aftermath & lessons learned

92
New cards

Preparation for an Incident

awareness, prevention, and planning

93
New cards

CIS

Center for Internet Security , non-profit org dedicated to developing & promoting best practice solutions for cyber defense, maintains the Critical Security Controls

94
New cards

NIST

National Institute of Standards & Technology, a department of commerce agency, has developed some of the most widely used frameworks & guidance for many types of orgs

95
New cards

ISO

International Organization for Standardization

96
New cards

Justice Process

Investigation, arrest, booking, initial appearance, preliminary hearing, grand jury or information, arraignment, trial, sentencing, appeals, sanction, release

97
New cards

Legal Elements of Criminality

Commission of an act, criminal intent, concurrence, causation, harm

98
New cards

Defense

A legal strategy that defendants use to establish that they should not be found guilty of a specific crime

99
New cards

exclusionary rule

a law that prohibits the use of illegally obtained evidence in a criminal act, “fruit of the poisonous tree”

100
New cards

4th Amendment

protects citizens from unreasonable searches & seizures