Web-Based Criminal Activity and Malware
37 Questions
0 Views

Web-Based Criminal Activity and Malware

Created by
@IndebtedOwl

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of activities are considered as web-based criminal activity?

  • Cryptocurrency mining
  • Social media interactions
  • Dissemination of offensive materials (correct)
  • Online shopping and selling
  • The Classical Era of viruses was characterized by sophisticated attacks targeting vulnerable systems.

    False

    What are two examples of threats included in threatening communications?

    Extortion, cyber bullying

    Worms are primarily used to set up a large-scale ______ attack.

    <p>DoS</p> Signup and view all the answers

    Match the type of malware with its description:

    <p>Viruses = Self-replicating malicious code that spreads Worms = Used to launch Denial of Service attacks Bots = Compromised computers used for malicious purposes Spam = Unsolicited electronic messaging</p> Signup and view all the answers

    During which era did viruses start to primarily infect documents and templates?

    <p>Macro Era</p> Signup and view all the answers

    A botnet is created by using a single compromised computer.

    <p>False</p> Signup and view all the answers

    What is one common form of fraud related to web-based criminal activities?

    <p>Credit card fraud</p> Signup and view all the answers

    What is a major challenge in enforcing the Internet Gambling Prohibition & Enforcement Act of 2006?

    <p>Public international cooperation</p> Signup and view all the answers

    Cyberbullying is illegal under Federal law across the United States.

    <p>False</p> Signup and view all the answers

    What type of online pharmaceuticals are often involved in illegal purchases?

    <p>anabolic steroids and painkillers</p> Signup and view all the answers

    Cyberstalking involves repeated following and/or harassing another person using ______.

    <p>electronic communication</p> Signup and view all the answers

    Match the following terms with their definitions:

    <p>Cyberstalking = Willful, malicious, and repeated harassment via electronic communication Cyberharassment = Focuses on actual harm, including defamation of character Online Gambling = Accessible all day and potentially profitable Cyberbullying = Aggressive acts against a victim using electronic forms of contact</p> Signup and view all the answers

    Which of these statements regarding online gambling is true?

    <p>It can generate billions in profit.</p> Signup and view all the answers

    Cyberharassment intentionally inflicts emotional distress on the victim.

    <p>True</p> Signup and view all the answers

    What law makes online gambling illegal in the United States?

    <p>Internet Gambling Prohibition &amp; Enforcement Act of 2006</p> Signup and view all the answers

    Which of the following is not a type of web-based criminal activity?

    <p>E-commerce</p> Signup and view all the answers

    Emerging trends in web-based crime include financial losses and threats to personal security.

    <p>True</p> Signup and view all the answers

    What are the six classifications of motives for modern computer intruders?

    <p>Financial gain, corporate espionage, personal gain, political motivations, revenge, and pleasure.</p> Signup and view all the answers

    ___ theft involves stealing someone’s personal information for fraudulent purposes.

    <p>Identity</p> Signup and view all the answers

    Which activity is a form of online crime that involves disrupting the normal functioning of computers?

    <p>Malware</p> Signup and view all the answers

    Match the following terms with their descriptions:

    <p>Identity theft = Stealing someone’s personal information Industrial espionage = Stealing corporate secrets Cyber vandalism = Tampering with information on the internet DOS attack = Disrupting a service by overwhelming it with requests</p> Signup and view all the answers

    Online crime is limited to activities that occur solely through the internet.

    <p>False</p> Signup and view all the answers

    What is one way modern terrorists are changing the face of terrorism?

    <p>By utilizing technology to facilitate and coordinate their activities.</p> Signup and view all the answers

    What is the last step in the money laundering process?

    <p>Integration</p> Signup and view all the answers

    The process of money laundering does not include finding illicit funds.

    <p>True</p> Signup and view all the answers

    Name one method used to combat money laundering.

    <p>Frozing accounts</p> Signup and view all the answers

    The second step in the money laundering process is called _______.

    <p>Layering</p> Signup and view all the answers

    Match the following reasons for the increase in computer crime with their descriptions:

    <p>Increased connectivity = Leading to vulnerability in systems Decreasing technical expertise = Making it easier for less skilled individuals to commit crimes Apathy of government = Lack of enforcement against cyber crime Sophisticated methodologies = Use of advanced technology by threat groups</p> Signup and view all the answers

    What is the Salami technique commonly associated with?

    <p>Stealing fractions of a cent from multiple accounts.</p> Signup and view all the answers

    IP Spoofing involves manipulating data packets to gain unauthorized access to funds.

    <p>True</p> Signup and view all the answers

    What is the primary purpose of money laundering?

    <p>To conceal the identity, source, and destination of income.</p> Signup and view all the answers

    Fraud via data manipulation is broadly referred to as __________.

    <p>data diddling</p> Signup and view all the answers

    Match the following crimes with their descriptions:

    <p>Securities Fraud = Tricking individuals into buying inflated stocks e-Fencing = Sale of stolen goods online Insider Trading = Using confidential information for personal gains Fraudulent Instruments = Counterfeiting and forgery through technology</p> Signup and view all the answers

    Which of the following practices represents insider trading?

    <p>Exchanging information about company stock with friends for profit.</p> Signup and view all the answers

    The Salami technique is designed to be very noticeable to bank systems.

    <p>False</p> Signup and view all the answers

    What is e-Fencing?

    <p>The sale of stolen goods through technological means.</p> Signup and view all the answers

    Study Notes

    Web-Based Criminal Activity

    • Computer crime can involve more than Internet-based activities, for example financial losses, threats to personal security, industrial espionage, threats to international security, and threats to public safety.
    • Online crime can involve interference with lawful use of computers, theft of information and copyright infringement, dissemination of contraband or offensive materials, threatening communications, fraud and ancillary crimes.

    Malware: Viruses

    • Viruses and their design, and dissemination, have gone through different phases.
    • Classical Era (1960s-1970s) involved pranks or accidental distribution
    • Floppy Era (1980s-1990s) targeted DOS machines and were distributed via floppy disks.
    • Macro Era (1990s-2000s) infected documents and templates rather than programs.
    • Internet Era (2000-present) are more sophisticated and seek out vulnerable systems.

    Malware: Worms, DoS, and Botnets

    • Worms are often used to set up a large-scale DoS attack.
    • DoS (Denial of Service) and DDOS (Distributed Denial of Service) attacks attempt to overwhelm servers such as through mail-bombing.
    • Botnets and Zombie Armies use zombies, compromised computers linked to the Internet as an army (or botnet), for theft, extortion, or DDOS attack.

    Malware: Spam

    • Spam is the abuse of electronic messaging systems taking up resources across multiple platforms.

    Neo-Traditional Crime

    • Online Pharmacies are used to make legitimate and illegitimate purchases (e.g., anabolic steroids, amphetamines, and painkillers) privately and conveniently.
    • Online Gambling can be accessed easily, including by minors, is open all day, and e-Banking makes it easier to play.
    • The Internet Gambling Prohibition & Enforcement Act of 2006 makes it illegal to gamble online, but difficult to enforce due to lack of public and international cooperation.

    Neo-Traditional Crime

    • Cyberstalking and harassment are types of threatening and harassing communications.
    • Stalking is the willful, malicious, and repeated following and/or harassing another person in an effort to inflict or cause fear of actual harm.
    • Cyberstalking utilizes electronic communication.
    • Cyberharassment focuses on actual harm suffered including defacement of character.
    • Cyberbullying is an aggressive, intentional act carried out by a group or individual using electronic forms of contact, repeatedly and over time against a victim, who cannot easily defend him or herself.

    Neo-Traditional Crime

    • Data Diddling is any method of fraud via data manipulation (usually involves redirecting or rerouting data representing monies or economic exchanges).
    • Salami technique is the stealing of a fraction of a cent from millions of accounts in order to go undetected.
    • IP Spoofing is the manipulation of data packets between computers to mimic a third party and falsely gain access to funds.

    Neo-Traditional Crime

    • Individuals having instant access to stock values and statistics, encouraging day-trading, have been observed to buy stock with little or no actual knowledge of the company.
    • Individuals are vulnerable to the dissemination of false information to trick individuals into purchasing stock at inflated prices.
    • Insider trading is individuals with access to confidential information using it for their own personal gain through stock purchases or sales.

    Neo-Traditional Crime

    • E-Fencing is the sale of stolen goods through technological means.
    • Fraudulent Instruments include counterfeiting and forgery through technological means.

    Ancillary Crimes

    • Money Laundering is the enterprise or practice of engaging in deliberate financial transactions to conceal the identity, source, and/or the destination of income.
    • Money laundering is usually a critical element for organized crime to function.

    Ancillary Crimes

    • The Process of Money Laundering includes the placing (point of entry of illicit funds), layering (using networks to obscure origins of funds) and integration (return of funds to legitimate economy).

    Ancillary Crimes

    • Combating Money Laundering includes finding illicit funds, freezing (accounts), and forfeiture (of funds).

    Ancillary Crimes

    • Combating Money Laundering can be accomplished by holding internet service providers accountable for failure to maintain adequate records, making financial institutions responsible for inadequate security, and enforcing “Know Your Customers” regulations.

    Conclusions

    • Technology both enhances and threatens modern society.
    • Computer crime is increasing due to a variety of reasons, including computers being equivalent to storage warehouses, increasing connectivity & interdependence of infrastructures, decreasing importance of technical expertise, increasing number of threat groups with sophisticated methodologies & advance technology, and government apathy.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Explore the complexities of web-based criminal activities, including various forms of computer crime and their implications. Dive deep into the evolution of malware, focusing on viruses and worms, as well as their impact on personal and international security.

    More Like This

    Cybercrime and Malware
    12 questions
    Malware and Cybercrime
    38 questions
    Unit 4: Tools in Cybercrime
    126 questions
    Use Quizgecko on...
    Browser
    Browser