Cybercrime and Information System Security
23 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the name of the business policy that permits or encourages employees to use their own mobile devices to access company computing resources and applications?

Bring Your Own Device (BYOD)

What is the name of the act that states it is legal to spam, provided the messages meet a few basic requirements?

CAN-SPAM Act

What is the term used to describe a program that enables its user to gain administrator-level access to a computer without the end user's consent or knowledge?

Rootkit

What is the name of the attack that floods a target site with requests for data and other small tasks, leading to problems or slowdowns on the target site?

<p>Distributed Denial-of-Service (DDoS) Attacks</p> Signup and view all the answers

What is the term used to describe the theft of personal information and then used without their permission?

<p>Identity Theft</p> Signup and view all the answers

What is the name of the software that provides a comprehensive display of all vital data related to an organization's security defenses?

<p>Security dashboard software</p> Signup and view all the answers

What is the name of the software that scans for specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus?

<p>Antivirus Software</p> Signup and view all the answers

Computer attackers often target vulnerable systems.

<p>True</p> Signup and view all the answers

The US-CERT regularly updates a summary of the most frequent, high-impact vulnerabilities.

<p>True</p> Signup and view all the answers

To address vulnerabilities, it is important to keep applications and OSs up-to-date.

<p>True</p> Signup and view all the answers

What is the acronym for the policy that allows employees to use their own mobile devices to access company resources?

<p>BYOD</p> Signup and view all the answers

What does CAPTCHA stand for?

<p>Completely Automated Public Turing test to tell Computers and Humans Apart</p> Signup and view all the answers

What is the name for a group of computers taken over by a malicious hacker, and used to flood a target site with requests?

<p>Botnet</p> Signup and view all the answers

What is the name for a set of programs that provide administrative access to a computer without the end user's knowledge?

<p>Rootkit</p> Signup and view all the answers

Phishing is a form of social engineering that attempts to obtain sensitive information by disguising as a trustworthy entity.

<p>True</p> Signup and view all the answers

What term describes a variation of phishing, where the fraudulent emails are sent to a certain organization's employees?

<p>Spear-phishing</p> Signup and view all the answers

Data breaches can sometimes lead to identity theft.

<p>True</p> Signup and view all the answers

Which of these is NOT a security measure that e-commerce websites use to protect customer information?

<p>Verification of user's postal address</p> Signup and view all the answers

Computer crime is a growing area of concern that requires careful management attention.

<p>True</p> Signup and view all the answers

Organizations should implement a layered security solution to make it difficult for attackers to compromise their systems.

<p>True</p> Signup and view all the answers

The US-CERT regularly updates a summary of the most frequent and critical vulnerabilities reported.

<p>True</p> Signup and view all the answers

User accounts that remain active after employees leave a company are not a security concern.

<p>False</p> Signup and view all the answers

It is not necessary to create roles and user accounts that align with the specific responsibilities of each individual.

<p>False</p> Signup and view all the answers

Study Notes

Chapter 13: Cybercrime and Information System Security

  • Cybercrimes are increasing
  • Organizations are implementing countermeasures to combat cybercrime
  • Computer incidents are prevalent due to increasing complexity, expanding and changing systems, and increased prevalence of BYOD policies

Objectives

  • Explain why computer incidents are so prevalent
  • Identify and describe types of computer exploits and their impact

The Threat Landscape

  • Cybercrimes are increasing
  • Organizations are implementing countermeasures

Why Computer Incidents Are So Prevalent

  • Increasing complexity increases vulnerability: Cloud computing, networks, computers, mobile devices, virtualization, OS applications, websites, switches, routers, and gateways are interconnected with millions of lines of code.
  • Expanding and changing systems introduce new risks: It's difficult for IT organizations to keep up with the technological pace, ongoing assessment of security risks and to implement approaches.
  • Increased prevalence of BYOD policies: Businesses allow employees to use their own devices for company computing, but this makes safeguarding devices and applications more complex.

Why Computer Incidents Are So Prevalent - Continued

  • Increasing sophistication of those who would do harm: Today's computer attacks are organized and target organizations and websites.

Types of Exploits

  • Common attacks include: Ransomware, Viruses, Worms, Trojan Horses, Spam, DDoS attacks, Rootkits, Phishing and Identity theft.

Ransomware

  • Malware that prevents computer or data access until a ransom is paid.

Viruses

  • A piece of code disguised as something else that causes unexpected computer behavior. Spreads when a user shares an infected file (e.g., in an email).

Worms

  • Harmful programs that duplicate without human intervention. Malware can be a worm and ransomware at the same time.

Trojan Horses

  • Seemingly harmless program with hidden malicious code. Victims are tricked into opening it. Trojan horses can destroy hard drives, corrupt files, control computers remotely, steal passwords, and spy on users.

Spam

  • Unwanted or unrequested emails used for marketing, often inexpensive. The CAN-SPAM Act states spam is legal if messages meet few basic requirements such as no false return address, a label identifying it as an ad or solicitation, and a way to opt out of future mailings.

Spam-Continued

  • CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is software that generates tests to distinguish humans from automated programs, bots preventing spamming. New CAPTCHAs include traffic light images

Distributed Denial-of-Service Attacks (DDoS)

  • Attackers take over a large group of computers (botnets) and flood a targeted site with requests for data or tasks, causing site problems and slowdowns

Rootkits

  • Enables a user to gain administrator-level access to a computer without permission or knowledge of the owner.

Phishing

  • Fraudulent emails to get recipients to reveal personal data, often disguised as legitimate requests.
  • Spear phishing is directed at specific organizations and targets specific employees, often higher-level executives.

Identity Theft

  • Theft of personal information and using it without permission
  • Data breach is the unintended release of sensitive data due to unauthorized access; most e-commerce websites use HTTPS encryption to protect information during transmission.

Federal Laws for Prosecuting Computer Attacks

  • Laws such as the Computer Fraud and Abuse Act, identity theft, and the USA Patriot Act address computer crime to protect computer systems.

Prevention

  • Organizations should implement layered security solutions (multiple layers to prevent an attack).
  • Educating employees and contract workers to guard passwords, prohibit using passwords, apply strict access controls, reporting unusual activity and protect portable devices.
  • Implementing a corporate firewall (software, hardware or combination) between the internal network and internet.
  • Utilizing a security dashboard to provide a comprehensive data display regarding security defenses.
  • Installing antivirus software to scan for virus (signature) presence and delete or quarantine the virus if found.
  • Implementing safeguards against attacks by malicious insiders by deleting accounts of departing employees, creating roles and accounts based on duties.
  • Addressing critical internet threats by fixing vulnerabilities using patches to software and keeping applications and OSs up-to-date.

Summary

  • Computer crime is important to address.
  • Organizations must take strong measures to ensure secure and reliable computing experiences.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

This quiz covers Chapter 13 on the rising threat of cybercrime and the importance of information system security. It explores the prevalence of computer incidents and the impact of various cyber exploits. Understand the factors that contribute to these trends and the strategies organizations are using to mitigate risks.

More Like This

Computer and Internet Crimes
10 questions
Cyber Crime Tactics and Techniques
18 questions
Information Systems Security and Cyber Warfare
21 questions
Use Quizgecko on...
Browser
Browser