CNIT 422 Exam 1

0.0(0)
studied byStudied by 14 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/270

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

271 Terms

1
New cards

Wall’s typology of cybercrime (4)

cyber-trespass, cyber-deception/theft, cyber-porn/obscenity, cyber-violence

2
New cards

types of insider threat (6)

accidental, malicious, non-malicious, internet-based, service provider, system admin

3
New cards

categories of insiders (5)

current staff, departing staff, former staff, service providers, partners

4
New cards

service provider insider threat

external staff, high turnover rate leads to poor management of authorization

5
New cards

system admin insider threat

has access to privileged info

6
New cards

hacker subculture norms

technology, knowledge, secrecy

7
New cards

digital piracy history: 1980s

warez doodz shared pirated software through BBS

8
New cards

digital piracy history: 1990s

P2P software and IRC, file sharing directly between users

9
New cards

digital piracy history: 2000s

torrent sharing (concurrent uploads and downloads through multiple sources)

10
New cards

subculture of digital piracy

knowledge should be free, profiteering companies make enough money anyways, no security protection = item deserves to be cracked

11
New cards

hacker history: 1950s

term “hacking” first emerged from MIT to describe people that played around skillfully with electronics, hacking was knowledge and solving problems

12
New cards

hacker history: 1960s

perception of hacker as skilled programmer and tinkerer continued, as computer tech moved from universities into military applications, number of hackers grew, culture of programmers based on hacker ethic (info should be free, access to computers should be unlimited, etc.)

13
New cards

hacker history: 1970s

phreaking and homebrew computing, still about learning and knowledge, phreaking got national attention, emergence of hobbyist groups focused on development of computer hardware and software

14
New cards

hacker history: 1980s

PCs were more accessible, video games exposed tech to young people, modem tech became accessible, rise of BBSs culture where hackers across country shared info with one another, movie WarGames features teenage hacker that piqued curiosity in hacking, term became more malicious, The Hacker Manifesto

15
New cards

hacker history: 1990s

computer security emerges which created tension between ethical and unethical hackers, Kevin Mitnick prosecuted, WWW and PC altered nature of business and communications, phishing, DOS attacks, web defacement

16
New cards

social organization of hackers

noobs (made fun of) → leets (held in high regards)

17
New cards

** technicways

the process of behavior changes in response to technological innovation

18
New cards

example of technicways

people used to communicate via telephone or in-person; now, they text, email, DM, etc.

19
New cards

CMCs

computer-mediated communications

20
New cards

examples of computer-mediated communications

email, texting, etc.

21
New cards

** digital natives

people who have never lived without technology (born in 1980s and later)

22
New cards

** digital immigrants

born before technology was a large aspect of daily life, have to adapt to digital environment

23
New cards

** 3 ways computers are abused by offenders:

  1. as a medium for communication and development of subcultures online

  2. as mechanisms to target sensitive resources and engage in crime

  3. as incidental devices to facilitate the offense and provide evidence of criminal activity online or offline

24
New cards

dark web

portion of Internet only accessed with specialized encryption software and browser protocols

25
New cards

How are The Onion Router and TOR Service used?

to hide user’s IP address and location details

26
New cards

subcultures

groups with their own values, norms, traditions, and rituals that set them apart (justifies actions of subculture members)

27
New cards

** web defacement

replacing existing HTML code with web page with the images/messages the attacker wants to create, often done by cyberpunks

28
New cards

What is (commonly) the motivation for acts of web defacement?

political

29
New cards

deviance

behavior that isn’t illegal but is outside of prevailing culture’s norms/beliefs

30
New cards

examples of deviance

texting during class or in the movie theater

31
New cards

** cyberdeviance

behavior that isn’t illegal but is outside of prevailing culture’s norms/beliefs with the use of technology

32
New cards

examples of cyberdeviance

pornographic images through webcams, cell phones, digital photography

33
New cards

** cybercrime

perpetrator uses special knowledge of cyberspace, involves Internet, always considered a computer crime too

34
New cards

** characteristics of cybercrime (2)

targets single individuals, economic motivations

35
New cards

** how cybercrimes differ from real-world crimes (6 points)

  • no boundary in cyberspace (people’s privacy is protected online)

  • hard to destroy online evidence

  • no physical presence to commit crime

  • easy to commit crime internationally

  • lack of extensive tools to commit crime (less tools = less evidence)

  • lack of legal consensus among countries

36
New cards

is a search for arsenic after a poisoning crime considered a computer crime?

no, the search is just evidence

37
New cards

** cyberterrorism

politically motivated use of computers as weapons/targets, intent on violence to influence an audience, causes widespread fear in society

38
New cards

** characteristics of cyberterrorism (3)

political motivations, designed to hurt/kill innocent people, strikes fear into larger population

39
New cards

reasons why cybercrime & cyberdeviance are attractive

easy access to technology (dropped prices of computers, small portable computers)

40
New cards

spam

unsolicited emails sent to addresses found online

41
New cards

proxy servers

hide location by being the intermediary between computers and servers on Internet

42
New cards

T/F: An attacker can be investigated in country without cyberlaws

False

43
New cards

T/F: True number of cyber offenses is unknown

What are the reasons for answer?

True (lack of reporting because illegal activity is not being recognized by victim, victim cannot identify clear risk patterns, protective software is not always working, victim is embarrassed for falling for scam)

44
New cards

incidental role

use of technology when committing crime

45
New cards

digital evidence

information transferred and stored in binary form

46
New cards

cyber-trespass

crossing boundaries of ownership in online environments

47
New cards

cyber-deception/theft

all the ways that individuals may illegally acquire information (hand in hand with cyber-trespassing)

48
New cards

methods of cyber-deception/cyber-theft

phishing, digital piracy

49
New cards

cyber-porn/obscenity

sexually expressive content online (defined differently by location)

50
New cards

cyber-violence

ability to send or access (emotionally or physically) harmful, dangerous materials online

51
New cards

distributed denial of service (DDoS)

attackers send multiple requests to servers that house online content to the point where servers are overloaded and unable to be accessed by true users

52
New cards

how the Internet impacted society

globalization, anonymity, lower inhibitions (more likely to do something online than in-person)

53
New cards

** differences in crime during the Industrial Revolution vs. Information Age

Industrial Revolution saw crimes face-to-face; Information Age sees anonymous online crime

54
New cards

The Great Divide

people who have access to technology vs. those who don’t

55
New cards

examples of informal social norms

parent's curfew, late to class, general rules

56
New cards

formal social norms

laws that say what you can and can’t do

57
New cards

** hack

the modification of technology to allow it to be used in new, innovative ways

58
New cards

T/F: Hacking is only for illegal purposes

False (hacking can happen for legal or illegal purposes)

59
New cards

examples of legal hack

jailbreaking programs that enable users to install third party programs to be used on a product originally not made to allow that

60
New cards

illegal hacks

modify programs, subvert security protocols

61
New cards

shoulder surfing

stealing passwords by looking over victim’s shoulder for keystrokes

62
New cards

shoulder surfing: legal or illegal hack?

illegal

63
New cards

social engineering

fool/convince people to give information to access resources, preys upon people’s willingness to help

64
New cards

social engineering: legal or illegal hack?

illegal

65
New cards

vulnerabilities

flaws in computer software or hardware (or people in the case of social engineering)

66
New cards

exploit

program that takes advantage of vulnerabilities to give the attacker deeper access to a system or network

67
New cards

non-nation state actors

no immediate affiliation to an organization

68
New cards

what non-nation state actors do

steal sensitive information that can be resold for profit

69
New cards

nation-state actors

engage in attacks in cooperation with a government entity

70
New cards

what nation-state actors do

target other government agencies, corporations, or universities to engage in espionage and theft of intellectual property

71
New cards

** hackers (definition + common characteristics)

no set definition

  • under the age of 30

  • younger people have more exposure to technology

  • mix of formal education and knowledge acquired on their own

  • male

  • social relationships that influence willingness to engage in different forms of behavior over time

72
New cards

bulletin board systems (BBSs)

sites that allowed asynchronous communications between users (posts and replies)

73
New cards

how hackers use BBSs

to provide information, tools, techniques

74
New cards

warez

pirated material hosted to download on BBS

75
New cards

hacker spaces

way for people with knowledge of technology to share what they know with others

76
New cards

the first PC virus

Brain

77
New cards

phone phreaking motivations

to strike out against telephone companies and to make free calls

78
New cards

The Hacker Manifesto

written by The Mentor, says hackers aren’t criminals but just seeking knowledge, that hackers are misunderstood, and supported the criminal aspects of hacking

79
New cards

** phishing

tricking consumers into transmitting financial information into fraud websites where information is saved for later fraud, attacker knows something about consumer

80
New cards

denial of service (DOS)

keeps individuals from using communications services, making them useless

81
New cards

noob

no status

82
New cards

script kiddies

term meant to shame individuals by recognizing use of premade script, lack of skill, and concurrent harm they may cause

83
New cards

lamers/wannabees

older hackers with limited capacity and skill

84
New cards

another name for lamers

wannabees

85
New cards

another name for wannabees

lamers

86
New cards

leet

experienced hackers

87
New cards

white hats

ethical hackers who find errors to benefit general computer security

88
New cards

black hats

use ethical hacking techniques to gain access to information and harm systems

89
New cards

gray hats

fall somewhere between white and black hats, motives change based on situation (and money)

90
New cards

biggest motivator for gray hats

money

91
New cards

internal attacker

someone who’s authorized to use and has legit access to computers, networks, and certain data

92
New cards

InfraGard

FBI project, nonprofit public-private partnership designed for information sharing between academics, industry, and LE

93
New cards

** precursor to hacking

phone phreaking

94
New cards

** Homebrew Computer Club

fell apart due to companies forming and their company secrets that could not be shared with other hackers

95
New cards

** evolution of hacking

used to be about exploration and learning

96
New cards

examples of nontechnical hacks

social engineering, shoulder surfing

97
New cards

espionage

spying

98
New cards

traditional hackers

anti-establishment, old school (dedication to information sharing, learning, knowledge, and curiosity)

99
New cards

contemporary hackers

motivated by money, revenge, and notoriety

100
New cards

cracker

criminal hacker, violate security systems for illicit purposes