Cyber crime exam 1

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

First big change in policing

1928 2 officers rigged glass tubes and copperware in a Detroit squad car

2
New cards

call box

was the old method to getting calls for crimes

3
New cards

Tech myths cleaning

  1. clean security footage. 2. hacking is often portrayed as evildoers most are white hat hackers. 3. tracking it perphs of digital crimes, cellphones can’t be differentiated voicemail can’t be trusted or verified. every element of a phone can be duplicated. 4. encryption. 5. DNA testing

4
New cards

role of AI

AI allows machines to perform tasks that usually require human intelligence including making decisions, recognizing human speech, and visual elements, and translating language.

5
New cards

AI in cyber

helps to critically protect online systems. can be used for automated threat detecting, generating alerts, identifying new strands of malware, and protecting business-sensitive data.

6
New cards

Benefits of AI in CS

deep learning, machine learning, natural language processing, reasoning.

7
New cards

AI Now:

used in human resources, IT departments, onboard new employees, providing resources, etc.

8
New cards

Automating

helps organizations identify and correct potential deficiencies in security strategy. able to implement formalized procedures that result in a more secure IT environment

9
New cards

Money Laundering

process of disguising money obtained through illegal activity to appear it come from legitimate sources.

10
New cards

why launder money?

it pays expenses for an illegal activity you can invest proceeds. it boosts illegal activity. it sustainsa luxurious lifestyle

11
New cards

who launders money?

Terriots, businesspeople, politicians, drug dealers, mercenaries.

12
New cards

Bluebox

illegal electronic device capable of duplicating multiple frequency dialing system developed by AT&T

13
New cards

Malware

a set of instructions that run on your computer and make your system do something that an attacker wants it to do.

14
New cards

Virus

a malicious piece of code that spreads itself from file to file. needs a host a file

15
New cards

types of viruses

program, boot and macro

16
New cards

worms

malicious piece of code that spreads itself from computer to computer from vulnerabilities. doesn’t need a host file and spreads without user interaction via email, LAN, internet.

17
New cards

malicious scripts

written in javascript, VB script, active x, flash, etc, and can be hidden in emails or websites.

18
New cards

Backdoors and rootkits

secret entry points: into a program/system that allows someone to gain access without going through security.

19
New cards

Backdoors

usually left by programmers for debugging and testing purposes, intentionally or unintentionally.

20
New cards

rootkits

installed by an attacker after gaining root/admin access. it modifies the entire system and avoids detection.

21
New cards

logic bombs

code programmed to be activated on a specific date, time, or circumstances. often combined with a virus/worm.

22
New cards

Blended Threats

Advanced software that combines viruses, worms, trojans, and malicious scripts. exploits one or many vulnerabilities in programs or operating systems.

23
New cards

RFID Cards

cards used in metros, sport venue, building security, healthcare, retial, education and more.