Podcast
Questions and Answers
Which of the following is a form of online crime?
Which of the following is a form of online crime?
- Eco-terrorism
- Identity theft
- Spam
- All of the above (correct)
Industrial espionage is considered a type of computer crime.
Industrial espionage is considered a type of computer crime.
True (A)
What impact does cyber terrorism have on public safety?
What impact does cyber terrorism have on public safety?
It poses threats that can disrupt public safety measures and create fear among the public.
______ is the act of stealing personal information for fraudulent purposes.
______ is the act of stealing personal information for fraudulent purposes.
Emerging trends in web-based crime do not include which of the following?
Emerging trends in web-based crime do not include which of the following?
Name one motive classified for modern computer intruders.
Name one motive classified for modern computer intruders.
Match the following types of threats with their descriptions:
Match the following types of threats with their descriptions:
Threats to personal security are unrelated to computer crime.
Threats to personal security are unrelated to computer crime.
What is a primary characteristic of ransomware?
What is a primary characteristic of ransomware?
Ransomware typically requires users to have advanced technical knowledge to avoid them.
Ransomware typically requires users to have advanced technical knowledge to avoid them.
Name one method of proprietary information theft mentioned.
Name one method of proprietary information theft mentioned.
The FBI estimates that over ______ foreign governments have intelligence operations targeting the U.S.
The FBI estimates that over ______ foreign governments have intelligence operations targeting the U.S.
Match the following types of information theft with their descriptions:
Match the following types of information theft with their descriptions:
Which method of information theft involves looking over someone's shoulder?
Which method of information theft involves looking over someone's shoulder?
Trade secrets and copyrights hold value only based on the production of their owner.
Trade secrets and copyrights hold value only based on the production of their owner.
What is an example of ransomware mentioned in the content?
What is an example of ransomware mentioned in the content?
What type of online activity involves the unsolicited distribution of materials such as pornography and treasonous content?
What type of online activity involves the unsolicited distribution of materials such as pornography and treasonous content?
The Classical Era of viruses is characterized by widespread damage and malicious intent.
The Classical Era of viruses is characterized by widespread damage and malicious intent.
What does DoS stand for in the context of cyber attacks?
What does DoS stand for in the context of cyber attacks?
Worms are primarily used to set up large-scale ______ attacks.
Worms are primarily used to set up large-scale ______ attacks.
Match the type of cyber threat with its description:
Match the type of cyber threat with its description:
Which era of viruses was characterized by infections in documents and templates?
Which era of viruses was characterized by infections in documents and templates?
Fraudulent activities conducted online do not include stock manipulation.
Fraudulent activities conducted online do not include stock manipulation.
What is one common use of a botnet in cybercrime?
What is one common use of a botnet in cybercrime?
Which of the following is considered a motive for modern computer intruders?
Which of the following is considered a motive for modern computer intruders?
Identity theft is a type of computer crime that involves non-internet activities.
Identity theft is a type of computer crime that involves non-internet activities.
What is a common form of malware that disrupts computer systems?
What is a common form of malware that disrupts computer systems?
Eco-terrorism involves __________ with the lawful use of computers.
Eco-terrorism involves __________ with the lawful use of computers.
Match the following types of web-based criminal activity to their descriptions:
Match the following types of web-based criminal activity to their descriptions:
Which of the following is NOT a consequence of web-based criminal activity?
Which of the following is NOT a consequence of web-based criminal activity?
Cyber vandalism includes the act of altering or defacing a website.
Cyber vandalism includes the act of altering or defacing a website.
What emerging trend in web-based crime is characterized by the use of technology by modern terrorists?
What emerging trend in web-based crime is characterized by the use of technology by modern terrorists?
During which era did viruses primarily target DOS machines?
During which era did viruses primarily target DOS machines?
Botnets are used only for non-malicious activity.
Botnets are used only for non-malicious activity.
What is the main purpose of a Denial of Service (DoS) attack?
What is the main purpose of a Denial of Service (DoS) attack?
The act of sending unsolicited emails is referred to as _____
The act of sending unsolicited emails is referred to as _____
Match the types of malware with their definitions:
Match the types of malware with their definitions:
Which of the following is NOT considered a type of web-based crime?
Which of the following is NOT considered a type of web-based crime?
Ancillary crimes such as money laundering are irrelevant to web-based criminal activity.
Ancillary crimes such as money laundering are irrelevant to web-based criminal activity.
What do DoS and DDOS stand for in the context of cyber attacks?
What do DoS and DDOS stand for in the context of cyber attacks?
What is a primary characteristic of ransomware?
What is a primary characteristic of ransomware?
Ransomware typically affects only high-security systems.
Ransomware typically affects only high-security systems.
Name one method of proprietary information theft.
Name one method of proprietary information theft.
The FBI estimates that over __________ foreign governments have intelligence operations targeting the U.S.
The FBI estimates that over __________ foreign governments have intelligence operations targeting the U.S.
Match the following theft methods with their descriptions:
Match the following theft methods with their descriptions:
Which of the following is a common vulnerability factor for users regarding ransomware?
Which of the following is a common vulnerability factor for users regarding ransomware?
Trade secrets and copyrights have no value independent of their owner's production.
Trade secrets and copyrights have no value independent of their owner's production.
What is one example of ransomware mentioned in the content?
What is one example of ransomware mentioned in the content?
What is the primary purpose of a botnet in cybercrime?
What is the primary purpose of a botnet in cybercrime?
Computer worms are primarily used for data encryption.
Computer worms are primarily used for data encryption.
Name one method of disseminating malware during the Floppy Era.
Name one method of disseminating malware during the Floppy Era.
Denial of Service (DoS) attacks aim to overwhelm __________.
Denial of Service (DoS) attacks aim to overwhelm __________.
Match the following eras of viruses with their characteristics:
Match the following eras of viruses with their characteristics:
Which type of crime involves threatening communications?
Which type of crime involves threatening communications?
Spam refers to legitimate electronic messaging.
Spam refers to legitimate electronic messaging.
What does DDOS stand for?
What does DDOS stand for?
Which of the following best describes eco-terrorism?
Which of the following best describes eco-terrorism?
Cyber terrorism includes physical damage to facilities and equipment.
Cyber terrorism includes physical damage to facilities and equipment.
What term is used for stealing personal information for fraudulent purposes?
What term is used for stealing personal information for fraudulent purposes?
____ is a method of stealing proprietary information often carried out by malicious hackers.
____ is a method of stealing proprietary information often carried out by malicious hackers.
Match the following web-based criminal activities with their descriptions:
Match the following web-based criminal activities with their descriptions:
Which of the following represents a consequence of web-based criminal activity?
Which of the following represents a consequence of web-based criminal activity?
A Denial of Service (DoS) attack aims to improve the functionality of a network.
A Denial of Service (DoS) attack aims to improve the functionality of a network.
Name one emerging trend in web-based crime involving modern terrorists.
Name one emerging trend in web-based crime involving modern terrorists.
What is a potential consequence of a ransomware attack?
What is a potential consequence of a ransomware attack?
Less educated users are typically more vulnerable to ransomware attacks.
Less educated users are typically more vulnerable to ransomware attacks.
Name one traditional method used in proprietary information theft.
Name one traditional method used in proprietary information theft.
The FBI estimates that over __________ foreign governments have intelligence operations targeting the U.S.
The FBI estimates that over __________ foreign governments have intelligence operations targeting the U.S.
Match the following types of information theft with their descriptions:
Match the following types of information theft with their descriptions:
What was the ransom amount demanded by the PC Cyborg/Aids Trojan to regain access to files?
What was the ransom amount demanded by the PC Cyborg/Aids Trojan to regain access to files?
Trade secrets and copyrights hold value only based on the production of their owner.
Trade secrets and copyrights hold value only based on the production of their owner.
Identify one critical factor that can influence user vulnerability to ransomware.
Identify one critical factor that can influence user vulnerability to ransomware.
During which era did viruses primarily involve pranks or accidental distribution?
During which era did viruses primarily involve pranks or accidental distribution?
Viruses in the Floppy Era were primarily targeted towards DOS machines.
Viruses in the Floppy Era were primarily targeted towards DOS machines.
What type of cyber crime involves the unsolicited distribution of materials like pornography?
What type of cyber crime involves the unsolicited distribution of materials like pornography?
Worms are primarily used to set up large-scale ______ attacks.
Worms are primarily used to set up large-scale ______ attacks.
Which type of malware is characterized by the ability to replicate itself and spread across networks?
Which type of malware is characterized by the ability to replicate itself and spread across networks?
Match the following types of web-based criminal activities with their descriptions:
Match the following types of web-based criminal activities with their descriptions:
Malware, in the context of cybercrime, does not include spam.
Malware, in the context of cybercrime, does not include spam.
Name one common use of botnets in cybercrime.
Name one common use of botnets in cybercrime.
Which of the following is a category of web-based criminal activity?
Which of the following is a category of web-based criminal activity?
Identity theft is considered solely a financial crime with no impact on personal security.
Identity theft is considered solely a financial crime with no impact on personal security.
Name one emerging trend in web-based crime.
Name one emerging trend in web-based crime.
___ theft involves stealing proprietary information through illegal means.
___ theft involves stealing proprietary information through illegal means.
Match the following types of online crime with their definitions:
Match the following types of online crime with their definitions:
Which of the following does NOT represent a financial loss associated with computer crime?
Which of the following does NOT represent a financial loss associated with computer crime?
Financial losses from computer crime can only occur through direct theft.
Financial losses from computer crime can only occur through direct theft.
What is one example of malware mentioned that can disrupt computer systems?
What is one example of malware mentioned that can disrupt computer systems?
What is a common method used by insiders to steal proprietary information?
What is a common method used by insiders to steal proprietary information?
Ransomware can make digital resources accessible only after a ransom is paid.
Ransomware can make digital resources accessible only after a ransom is paid.
Name one example of ransomware mentioned.
Name one example of ransomware mentioned.
Ransomware often targets users with a lower level of ______ education.
Ransomware often targets users with a lower level of ______ education.
Match the types of information theft with their respective descriptions:
Match the types of information theft with their respective descriptions:
What is one characteristic of trade secrets and copyrights?
What is one characteristic of trade secrets and copyrights?
Political espionage does not involve foreign governments targeting the U.S.
Political espionage does not involve foreign governments targeting the U.S.
The FBI estimates that over ______ foreign governments have intelligence operations targeting the U.S.
The FBI estimates that over ______ foreign governments have intelligence operations targeting the U.S.
Which of the following factors may increase a user's vulnerability to ransomware?
Which of the following factors may increase a user's vulnerability to ransomware?
Social engineering tactics are used exclusively by external hackers.
Social engineering tactics are used exclusively by external hackers.
What is the financial amount that victims had to pay for access restoration after the PC Cyborg/Aids Trojan attack?
What is the financial amount that victims had to pay for access restoration after the PC Cyborg/Aids Trojan attack?
Ransomware is a type of malware that makes digital resources __________ or __________.
Ransomware is a type of malware that makes digital resources __________ or __________.
Match the following types of proprietary information theft with their methods:
Match the following types of proprietary information theft with their methods:
Which of the following is a serious concern regarding trade secrets and copyrights?
Which of the following is a serious concern regarding trade secrets and copyrights?
The FBI estimates that fewer than 50 foreign governments have intelligence operations targeting the U.S.
The FBI estimates that fewer than 50 foreign governments have intelligence operations targeting the U.S.
What type of espionage involves government entities monitoring communications or activities?
What type of espionage involves government entities monitoring communications or activities?
What is one motive for modern computer intruders?
What is one motive for modern computer intruders?
Industrial espionage is considered a form of web-based criminal activity.
Industrial espionage is considered a form of web-based criminal activity.
Name one example of threats to personal security mentioned.
Name one example of threats to personal security mentioned.
Cyber __________ involves using technology in a manner that disrupts or harms a community for political or ideological reasons.
Cyber __________ involves using technology in a manner that disrupts or harms a community for political or ideological reasons.
Match the following types of web-based criminal activity with their descriptions:
Match the following types of web-based criminal activity with their descriptions:
Which of the following is NOT a financial consequence of computer crime?
Which of the following is NOT a financial consequence of computer crime?
Eco-terrorism does not interfere with the lawful use of computers.
Eco-terrorism does not interfere with the lawful use of computers.
What classification of crime involves unauthorized access and misuse of information?
What classification of crime involves unauthorized access and misuse of information?
Which type of web-based criminal activity involves the unsolicited distribution of offensive materials?
Which type of web-based criminal activity involves the unsolicited distribution of offensive materials?
The primary purpose of a botnet is to launch cyber attacks, such as DoS attacks.
The primary purpose of a botnet is to launch cyber attacks, such as DoS attacks.
What are the effects of Denial of Service (DoS) attacks on servers?
What are the effects of Denial of Service (DoS) attacks on servers?
The era when viruses began infecting documents and templates is known as the __________ Era.
The era when viruses began infecting documents and templates is known as the __________ Era.
Match the type of malware with its description:
Match the type of malware with its description:
What is the classical purpose of viruses developed during the Classical Era?
What is the classical purpose of viruses developed during the Classical Era?
Cyberbullying is classified under threatening communications.
Cyberbullying is classified under threatening communications.
Name one type of web-based criminal activity related to financial fraud.
Name one type of web-based criminal activity related to financial fraud.
Which era of viruses was characterized by widespread use of floppy disks?
Which era of viruses was characterized by widespread use of floppy disks?
Digital fraud includes activities like auction fraud and credit card fraud.
Digital fraud includes activities like auction fraud and credit card fraud.
What does a DoS attack aim to do?
What does a DoS attack aim to do?
______ are used in cybercrime to create an army of compromised computers.
______ are used in cybercrime to create an army of compromised computers.
Match the types of malware with their definitions:
Match the types of malware with their definitions:
Which of the following is an example of threatening communication?
Which of the following is an example of threatening communication?
Ancillary crimes, such as money laundering, are considered ______ to web-based criminal activity.
Ancillary crimes, such as money laundering, are considered ______ to web-based criminal activity.
Macro viruses primarily target standalone applications.
Macro viruses primarily target standalone applications.
What is a key factor that increases a user's vulnerability to ransomware?
What is a key factor that increases a user's vulnerability to ransomware?
Ransomware can only be delivered through online channels.
Ransomware can only be delivered through online channels.
Name one method of traditional information theft mentioned.
Name one method of traditional information theft mentioned.
Ransomware typically encrypts files and demands a ransom to __________ them.
Ransomware typically encrypts files and demands a ransom to __________ them.
Match the following actions with their corresponding methods of proprietary information theft:
Match the following actions with their corresponding methods of proprietary information theft:
Which of the following is a specific example of ransomware?
Which of the following is a specific example of ransomware?
Political espionage involves monitoring and gathering information by foreign governments.
Political espionage involves monitoring and gathering information by foreign governments.
What organization estimates that over 120 foreign governments have intelligence operations targeting the U.S.?
What organization estimates that over 120 foreign governments have intelligence operations targeting the U.S.?
Which type of crime involves the theft of confidential business information?
Which type of crime involves the theft of confidential business information?
Interference with lawful use of computers is a form of online crime.
Interference with lawful use of computers is a form of online crime.
Name one common motive for modern computer intruders.
Name one common motive for modern computer intruders.
____ is a type of malware that can encrypt user data for ransom.
____ is a type of malware that can encrypt user data for ransom.
Match the following types of online crime with their definitions:
Match the following types of online crime with their definitions:
Which of the following is NOT a type of web-based crime?
Which of the following is NOT a type of web-based crime?
Economic losses due to cybercrime only occur within the financial sector.
Economic losses due to cybercrime only occur within the financial sector.
What is one emerging trend in web-based crime involving modern terrorists?
What is one emerging trend in web-based crime involving modern terrorists?
Study Notes
Contemporary Computer Crime
- Internet based crime can have a multitude of consequences including financial losses, threats to personal security, industrial espionage, threats to international security, and threats to public safety
Web-Based Criminal Activity
- Cyber crime can be broadly categorized into several areas including interference with the lawful use of computers, theft of information and copyright infringement, dissemination of contraband or offensive materials, threatening communications, fraud, and ancillary crimes
Malware: Viruses
- The design and dissemination of viruses has developed through different phases:
- The classical era (1960s to 1970s) involved pranks or were accidentally distributed
- The floppy era (1980s to 1990s) targeted DOS machines and were primarily distributed via floppy disks
- The macro era (1990s to 2000s) infected documents and templates rather than programs
- The internet era (2000 to present) has seen more sophisticated viruses seeking out vulnerable systems
- The spread of worms is often linked to a large-scale denial-of-service attack
Malware: Worms, DoS, and Botnets
- Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks aim to overwhelm computer servers, often through methods such as mail-bombing
- Botnets and zombie armies utilize compromised computers as a network (or botnet) to commit crimes such as theft, extortion, or DDoS attacks
Malware: Spam
- Spam is the abuse of electronic messaging systems, consuming resources across multiple platforms
Malware: Ransomware
- Ransomware is a type of malware that renders digital resources inoperable or inaccessible as part of an extortionate scheme
- Factors that contribute to the success of ransomware include the level of user education (less educated users are more susceptible) and the sophistication of the ransomware itself (not easily remedied by common software solutions)
- The PC Cyborg/Aids information Trojan, which was distributed via floppy mail, required victims to pay a fee to regain access to their files and decrypt their data
Theft of Information, Data Manipulation, and Web Encroachment
- Traditional methods for the theft of proprietary information can include:
- Insiders, either while employed or through maintenance backdoors
- Social engineering, such as shoulder surfing and dumpster diving
- Theft of equipment
- Malware
- There are concerns around the theft of trade secrets and copyrights, as these forms of intellectual property have value regardless of who owns them
- The theft of this type of property can be perpetrated by disgruntled employees, competitors, and government entities
- Political espionage is a serious threat, with estimates suggesting that over 120 foreign governments have intelligence operations targeting the United States
- The FBI discovered that Israeli intelligence had secretly monitored presidential communications
Web-Based Criminal Activity
- Web-based crime includes interference with legal use of computers, theft of information and copyright infringement, dissemination of contraband or offensive materials, fraudulent behaviour, and ancillary crimes.
- Examples of Web-based criminal activity includes denial-of-service attacks, malware infection, spamming, cyberbullying, credit card fraud, money laundering, and identity theft.
Malware: Viruses
- In the classical era (1960s-1970s), viruses were often pranks, distributed accidentally or purposefully.
- During the floppy era (1980s-1990s), viruses primarily targeted DOS machines and were often distributed via floppy disks.
- The macro era (1990s-2000s) saw viruses infect documents and templates rather than programs.
- In the internet era (2000-present), viruses have become more sophisticated and target vulnerable systems on the internet.
Malware: Worms, DoS, and Botnets
- Worms are often used to set up large-scale distributed denial-of-service (DoS) attacks.
- DoS and DDoS attacks are designed to overwhelm servers, often through mail-bombing.
- Botnets (zombie armies) use compromised computers linked to the internet to perform illegal activities such as theft, extortion, and DDoS attacks.
Malware: Spam
- Spam is the abuse of electronic messaging systems.
- Spam is used to generate revenue, spread misinformation, or harass users.
Malware: Ransomware
- Ransomware is malware that makes digital resources inoperable or inaccessible to extort money from users.
- The success of ransomware relies on the user's education level, the sophistication of the malware, and the lack of available software remedies.
Theft of Information, Data Manipulation, and Web Encroachment
- Traditional methods of proprietary information theft can occur due to insiders, social engineering, theft of equipment, and malware.
- Theft of intellectual property, such as trade secrets and copyrights, can result from disgruntled employees, competitors, and government entities.
- Political espionage is a serious problem, with over 120 foreign governments estimated to be targeting the US.
Theft of Information, Data Manipulation, and Web Encroachment
- Political espionage can be used to gain an advantage in international relations or economic competition.
- Israel intelligence, for example, secretly monitored Presidential communications in 2000, displaying the potential for international political influence.
Web-Based Criminal Activity
- Includes financial loss, cyber threats, and industrial espionage.
- Examples of online crime include interference with lawful use of computers, theft of information and copyright infringement, and dissemination of contraband or offensive materials.
- Other web-based crimes include threatening communications, fraud, and ancillary crimes.
Malware: Viruses
- Early viruses involved pranks or were distributed accidentally.
- Floppy era viruses mainly infected DOS machines and were primarily distributed via floppy disks.
- Macro era viruses infected documents and templates rather than programs.
- Internet era viruses are more sophisticated and target vulnerable systems.
Malware: Worms, DoS, and Botnets
- Worms are often used to create large-scale DoS attacks.
- Denial of Service (DoS) attempts to overload servers, for example, through mail-bombing.
- Distributed Denial of Service (DDoS) attacks use compromised computers (zombies) linked to the internet as a botnet for theft, extortion, or DDoS attacks.
Malware: Spam
- Spam abuses electronic messaging systems, taking up resources across multiple platforms.
Malware: Ransomware
- Ransomware restricts access to digital resources in an extortion scheme.
- Victims with less computer literacy are more vulnerable to ransomware.
- Examples include the PC Cyborg/Aids Trojan, distributed through mail on a floppy disk, requiring $378 payment for access recovery.
Theft of Information, Data Manipulation, and Web Encroachment
- Traditional methods of information theft include actions by insiders, social engineering (like shoulder surfing and dumpster diving), theft of equipment, and malware.
- Trade secrets and copyrights have inherent value independent of the owner's production, such as a company's new razor design.
- Theft of trade secrets can result from disgruntled employees, competitors, or government entities.
- Political espionage poses a significant threat, as governments monitor the U.S. on a large scale, such as the Israeli intelligence monitoring Presidential communications.
Web-Based Criminal Activity
- Computer crimes can extend beyond the internet, encompassing financial losses, threats to personal security, industrial espionage, threats to international security, and threats to public safety.
- Activities that fall under "online crime" include interference with lawful computer use via eco-terrorism, DOS attacks, malware deployment, cyber vandalism, cyber terrorism, spam, and information theft such as industrial espionage, ID theft, and ID fraud.
- Other web-based criminal activities include the dissemination of contraband or offensive materials like pornography, child pornography, online gaming, and treasonous or racist material.
- Threatening communications via extortion, cyber stalking, cyber harassment, and cyber bullying are also included.
- Financial crimes like auction fraud, credit card fraud, theft of services, stock manipulation, and ancillary crimes like money laundering and conspiracy are prevalent.
Malware: Viruses
- Viruses have evolved through different phases:
- Classical Era (1960s–1970s): Focused on pranks or accidental distribution.
- Floppy Era (1980s–1990s): Targeted DOS machines, predominantly spread through floppy disks.
- Macro Era (1990s–2000s): Infected documents and templates rather than programs.
- Internet Era (2000–present): More sophisticated, seeking vulnerable systems.
Malware: Worms, DoS, and Botnets
- Worms commonly serve as a foundation for large-scale DoS attacks.
- Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks attempt to overwhelm servers, often through mail-bombing tactics.
- Botnets and Zombie Armies utilize compromised computers connected to the internet, forming a botnet for theft, extortion, or DDoS attacks.
Malware: Spam
- Spam involves the abuse of electronic messaging systems, consuming resources across multiple platforms.
Malware: Ransomware
- Ransomware disrupts or restricts access to digital resources as part of an extortion scheme.
- The effectiveness of ransomware depends on user education levels and the sophistication of the software.
Theft of Information, Data Manipulation, and Web Encroachment
- Traditional methods of stealing proprietary information involve insiders, social engineering tactics such as shoulder surfing and dumpster diving, equipment theft, and malware.
- Concerns surrounding trade secrets and copyrights involve the value of intellectual property independent of the owner's production.
- Disgruntled employees, competitors, and government entities can be involved in the theft of trade secrets and copyrights.
- Political Espionage poses significant threats, with the FBI reporting that over 120 foreign governments have intelligence operations targeting the U.S.
- Israeli intelligence has been known to secretly monitor Presidential communications.
Contemporary Computer Crime
- Computer crime encompasses various activities, including financial losses, threats to personal security, industrial espionage, threats to international security, and threats to public safety.
Web-Based Criminal Activity
- Web-based crime encompasses various forms, including interference with lawful computer use, theft of information, dissemination of contraband, threatening communications, fraud, and ancillary crimes.
Malware: Viruses
- Virus development and distribution have evolved through distinct phases: Classical Era, Floppy Era, Macro Era, and Internet Era.
- The Internet Era has seen the development of more sophisticated viruses seeking vulnerable systems.
Malware: Worms, DoS, and Botnets
- Worms primarily serve as a tool for launching large-scale DoS attacks.
- DoS and DDoS attacks aim to overwhelm servers via techniques like mail-bombing.
- Botnets are comprised of compromised computers, linked to the internet, forming a "zombie army" for illicit purposes like theft, extortion, and DDoS attacks.
Malware: Spam
- Spam refers to the abuse of electronic messaging systems, consuming resources across multiple platforms.
Malware: Ransomware
- Ransomware is a type of malware that disables or restricts access to digital resources in an extortion scheme.
- Factors contributing to ransomware susceptibility include user education level (less educated, more vulnerable) and the sophistication of the ransomware (not easily addressed by typical software remedies).
Theft of Information, Data Manipulation, and Web Encroachment
- Traditional methods of proprietary information theft involve insiders, social engineering, equipment theft, and malware.
- Trade secrets and copyrights possess value independently of their owner's production, making them vulnerable to theft.
- Theft can originate from disgruntled employees, competitors, and government entities.
- Political espionage presents a significant concern, with the FBI estimating that over 120 foreign governments conduct intelligence operations targeting the United States.
Web-Based Criminal Activity
- Computer crimes cause financial losses and threaten personal security, industrial espionage, international security, and public safety
- Online crimes include interference with the lawful use of computers, theft of information and copyright infringement, dissemination of contraband or offensive materials, threatening communications, fraud, and ancillary crimes.
Malware: Viruses
- Virus design and dissemination have progressed through different phases:
- Classical Era (1960s–1970s): pranks or accidental distribution.
- Floppy Era (1980s–1990s): DOS machines; primarily distributed via floppy disks.
- Macro Era (1990s–2000s): Infected documents and templates, rather than programs.
- Internet Era (2000–present): Sophisticated, seeking out vulnerable systems.
Malware: Worms, DoS, and Botnets
- Worms are primarily used for large-scale DoS (Denial of Service) attacks
- DoS and DDOS (Distributed Denial of Service) Attacks overwhelm servers
- Mail-bombing can cause a DoS attack
- Botnets use compromised computers to steal, extort, or carry out DDoS attacks
Malware: Spam
- Uses electronic messaging systems to take up resources across multiple platforms
Malware: Ransomware
- Makes digital resources inoperable or inaccessible in an extortion scheme
- Factors influencing vulnerability include:
- User's education level (less educated, more vulnerable)
- Sophistication of the ransomware (not amenable to common software remedies)
Theft of Information, Data Manipulation, and Web Encroachment
- Methods of proprietary information theft include:
- Insiders using their position or maintenance back doors
- Social engineering: shoulder-surfing and dumpster diving
- Theft of equipment
- Malware
- Trade secrets and copyrights are valuable regardless of the owner’s production.
- Theft can be perpetrated by disgruntled employees, competitors, and government entities
- Political espionage is a serious threat
- The FBI estimates that over 120 foreign governments have intelligence operations targeting the U.S.
- Israeli intelligence secretly monitored Presidential communications.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the various aspects of contemporary computer crime, including internet-based offenses and the evolution of malware. Explore the different phases of virus development and the impacts of cybercriminal activities on society and security. Test your understanding of these critical topics in digital safety.