Podcast
Questions and Answers
What type of activities are considered as web-based criminal activity?
What type of activities are considered as web-based criminal activity?
The Classical Era of viruses was characterized by sophisticated attacks targeting vulnerable systems.
The Classical Era of viruses was characterized by sophisticated attacks targeting vulnerable systems.
False
What are two examples of threats included in threatening communications?
What are two examples of threats included in threatening communications?
Extortion, cyber bullying
Worms are primarily used to set up a large-scale ______ attack.
Worms are primarily used to set up a large-scale ______ attack.
Signup and view all the answers
Match the type of malware with its description:
Match the type of malware with its description:
Signup and view all the answers
During which era did viruses start to primarily infect documents and templates?
During which era did viruses start to primarily infect documents and templates?
Signup and view all the answers
A botnet is created by using a single compromised computer.
A botnet is created by using a single compromised computer.
Signup and view all the answers
What is one common form of fraud related to web-based criminal activities?
What is one common form of fraud related to web-based criminal activities?
Signup and view all the answers
What is a major challenge in enforcing the Internet Gambling Prohibition & Enforcement Act of 2006?
What is a major challenge in enforcing the Internet Gambling Prohibition & Enforcement Act of 2006?
Signup and view all the answers
Cyberbullying is illegal under Federal law across the United States.
Cyberbullying is illegal under Federal law across the United States.
Signup and view all the answers
What type of online pharmaceuticals are often involved in illegal purchases?
What type of online pharmaceuticals are often involved in illegal purchases?
Signup and view all the answers
Cyberstalking involves repeated following and/or harassing another person using ______.
Cyberstalking involves repeated following and/or harassing another person using ______.
Signup and view all the answers
Match the following terms with their definitions:
Match the following terms with their definitions:
Signup and view all the answers
Which of these statements regarding online gambling is true?
Which of these statements regarding online gambling is true?
Signup and view all the answers
Cyberharassment intentionally inflicts emotional distress on the victim.
Cyberharassment intentionally inflicts emotional distress on the victim.
Signup and view all the answers
What law makes online gambling illegal in the United States?
What law makes online gambling illegal in the United States?
Signup and view all the answers
Which of the following is not a type of web-based criminal activity?
Which of the following is not a type of web-based criminal activity?
Signup and view all the answers
Emerging trends in web-based crime include financial losses and threats to personal security.
Emerging trends in web-based crime include financial losses and threats to personal security.
Signup and view all the answers
What are the six classifications of motives for modern computer intruders?
What are the six classifications of motives for modern computer intruders?
Signup and view all the answers
___ theft involves stealing someone’s personal information for fraudulent purposes.
___ theft involves stealing someone’s personal information for fraudulent purposes.
Signup and view all the answers
Which activity is a form of online crime that involves disrupting the normal functioning of computers?
Which activity is a form of online crime that involves disrupting the normal functioning of computers?
Signup and view all the answers
Match the following terms with their descriptions:
Match the following terms with their descriptions:
Signup and view all the answers
Online crime is limited to activities that occur solely through the internet.
Online crime is limited to activities that occur solely through the internet.
Signup and view all the answers
What is one way modern terrorists are changing the face of terrorism?
What is one way modern terrorists are changing the face of terrorism?
Signup and view all the answers
What is the last step in the money laundering process?
What is the last step in the money laundering process?
Signup and view all the answers
The process of money laundering does not include finding illicit funds.
The process of money laundering does not include finding illicit funds.
Signup and view all the answers
Name one method used to combat money laundering.
Name one method used to combat money laundering.
Signup and view all the answers
The second step in the money laundering process is called _______.
The second step in the money laundering process is called _______.
Signup and view all the answers
Match the following reasons for the increase in computer crime with their descriptions:
Match the following reasons for the increase in computer crime with their descriptions:
Signup and view all the answers
What is the Salami technique commonly associated with?
What is the Salami technique commonly associated with?
Signup and view all the answers
IP Spoofing involves manipulating data packets to gain unauthorized access to funds.
IP Spoofing involves manipulating data packets to gain unauthorized access to funds.
Signup and view all the answers
What is the primary purpose of money laundering?
What is the primary purpose of money laundering?
Signup and view all the answers
Fraud via data manipulation is broadly referred to as __________.
Fraud via data manipulation is broadly referred to as __________.
Signup and view all the answers
Match the following crimes with their descriptions:
Match the following crimes with their descriptions:
Signup and view all the answers
Which of the following practices represents insider trading?
Which of the following practices represents insider trading?
Signup and view all the answers
The Salami technique is designed to be very noticeable to bank systems.
The Salami technique is designed to be very noticeable to bank systems.
Signup and view all the answers
What is e-Fencing?
What is e-Fencing?
Signup and view all the answers
Study Notes
Web-Based Criminal Activity
- Computer crime can involve more than Internet-based activities, for example financial losses, threats to personal security, industrial espionage, threats to international security, and threats to public safety.
- Online crime can involve interference with lawful use of computers, theft of information and copyright infringement, dissemination of contraband or offensive materials, threatening communications, fraud and ancillary crimes.
Malware: Viruses
- Viruses and their design, and dissemination, have gone through different phases.
- Classical Era (1960s-1970s) involved pranks or accidental distribution
- Floppy Era (1980s-1990s) targeted DOS machines and were distributed via floppy disks.
- Macro Era (1990s-2000s) infected documents and templates rather than programs.
- Internet Era (2000-present) are more sophisticated and seek out vulnerable systems.
Malware: Worms, DoS, and Botnets
- Worms are often used to set up a large-scale DoS attack.
- DoS (Denial of Service) and DDOS (Distributed Denial of Service) attacks attempt to overwhelm servers such as through mail-bombing.
- Botnets and Zombie Armies use zombies, compromised computers linked to the Internet as an army (or botnet), for theft, extortion, or DDOS attack.
Malware: Spam
- Spam is the abuse of electronic messaging systems taking up resources across multiple platforms.
Neo-Traditional Crime
- Online Pharmacies are used to make legitimate and illegitimate purchases (e.g., anabolic steroids, amphetamines, and painkillers) privately and conveniently.
- Online Gambling can be accessed easily, including by minors, is open all day, and e-Banking makes it easier to play.
- The Internet Gambling Prohibition & Enforcement Act of 2006 makes it illegal to gamble online, but difficult to enforce due to lack of public and international cooperation.
Neo-Traditional Crime
- Cyberstalking and harassment are types of threatening and harassing communications.
- Stalking is the willful, malicious, and repeated following and/or harassing another person in an effort to inflict or cause fear of actual harm.
- Cyberstalking utilizes electronic communication.
- Cyberharassment focuses on actual harm suffered including defacement of character.
- Cyberbullying is an aggressive, intentional act carried out by a group or individual using electronic forms of contact, repeatedly and over time against a victim, who cannot easily defend him or herself.
Neo-Traditional Crime
- Data Diddling is any method of fraud via data manipulation (usually involves redirecting or rerouting data representing monies or economic exchanges).
- Salami technique is the stealing of a fraction of a cent from millions of accounts in order to go undetected.
- IP Spoofing is the manipulation of data packets between computers to mimic a third party and falsely gain access to funds.
Neo-Traditional Crime
- Individuals having instant access to stock values and statistics, encouraging day-trading, have been observed to buy stock with little or no actual knowledge of the company.
- Individuals are vulnerable to the dissemination of false information to trick individuals into purchasing stock at inflated prices.
- Insider trading is individuals with access to confidential information using it for their own personal gain through stock purchases or sales.
Neo-Traditional Crime
- E-Fencing is the sale of stolen goods through technological means.
- Fraudulent Instruments include counterfeiting and forgery through technological means.
Ancillary Crimes
- Money Laundering is the enterprise or practice of engaging in deliberate financial transactions to conceal the identity, source, and/or the destination of income.
- Money laundering is usually a critical element for organized crime to function.
Ancillary Crimes
- The Process of Money Laundering includes the placing (point of entry of illicit funds), layering (using networks to obscure origins of funds) and integration (return of funds to legitimate economy).
Ancillary Crimes
- Combating Money Laundering includes finding illicit funds, freezing (accounts), and forfeiture (of funds).
Ancillary Crimes
- Combating Money Laundering can be accomplished by holding internet service providers accountable for failure to maintain adequate records, making financial institutions responsible for inadequate security, and enforcing “Know Your Customers” regulations.
Conclusions
- Technology both enhances and threatens modern society.
- Computer crime is increasing due to a variety of reasons, including computers being equivalent to storage warehouses, increasing connectivity & interdependence of infrastructures, decreasing importance of technical expertise, increasing number of threat groups with sophisticated methodologies & advance technology, and government apathy.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the complexities of web-based criminal activities, including various forms of computer crime and their implications. Dive deep into the evolution of malware, focusing on viruses and worms, as well as their impact on personal and international security.