AP Notes, Outlines, Study Guides, Vocabulary, Practice Exams and more!

Digital Crime & Digital Terrorism Midterm Flashcards

Terms : Hide Images
6227933091Expanded use of SS numbers...it is the primary reason for the ease of identity theft.0
6227937853NOT a component of information warfare.propaganda1
6227941584True or false. Research has shown that most criminals fall into stage 3 or 4 of Kohlberg's stages of moral development.False. They fall into stage 1 or 2 for criminals and stage 3 or 4 for noncriminal.2
6227948396True or false. Espionage as service actors are usually better trained and better financed than state actors and typically do not leave forensic traces of their activities.False. This is true of state actors who do not leave forensic traces behind and are more professional.3
6227953829Websites that are commonly infectedsmall business websites, victim of script kiddies.4
6228001044Information Age1975+. The gathering and transmission of information.5
6228037758Malwaredestructive software embedded in a system or network.6
6228043258Research generally focuses on...mechanisms and techniques used to commit crime, rather than than on offenders and the offenses they commit.7
6228102518Donn Parkerthe first person to comment on the feasibility and potential of cyber security.8
6228134243Large variations of cyber crime estimates exist because...it is difficult to place monetary value on intellectual property and there are multiple levels of costs.9
6228221695Biggest threat to companies are...insiders. They know how the company works and often have high-level credentials to steal products and information. Also, they're less likely to be caught.10
6228275009Computer as a targetdenial of service one would expect or the alteration of data.11
6228277686Computer as the instrument of crimeUsed to obtain other criminal means. A target hack.12
6228290734Computer as incidental/accompanying to crimeit facilitates a crime. Relies on computer technology.13
6228302978Crimes associated with the prevalence of computersvictims of cyber crime increase.14
6228376100Terrorismthe pre-planned use or threat to use violence by individuals or sub-national groups to obtain political or social goals by intimidating large scale audiences. Their motive is important.15
6228379974Domestic Terrorismhome directed, home-grown, and more prevalent.16
6228378962Transnational Terrorismvenue country targets another country.17
6228412579Reasons cyber terrorism is ignored...lack of information and a lack of understanding. Victimization is ignored and results in revenue loss.18
6228431553Mass media's role in cyber terrorism...does not use correct terminology and does not know the difference between hacking and cyber terrorism.19
6228471863Cyberterrorisma premeditated, politically, or ideologically motivated attack or threat of attack against information, computer systems, computer programs, and data that can result in violence against civilian targets.20
62284752626 components of information warfare (psy-elec-mil-physi-secur-info)psychological operations, electronic warfare, military deception, physical destruction, security measures, and information attacks21
6228477940Terrorism is defined by...the nature of the act, not by the nature of the perpetrators or the nature of their cause.22
6228481956"Hacktivism"a hacker whose action is aimed at promoting a political or social cause. Characterized by website defacement, vandalism, and chaos.23
6228495622What has facilitated the expansion of almost every traditional form of crime?cybercrime.24
6228497631Stuxnet(2009) a virus used to infect the operating systems of specific command and control devices primarily found within the pumps and gas centrifuges used in the Natanz nuclear enrichment facilities in Iran.25
6228515571Flame(2012) a large program that was written primarily for espionage and information gathering. It allowed the attackers to seek and secure drawings, plans, policies, and other documents stored in a computer or network.26
6228519231Information attacks are...less destructive, but more disruptive (think simply: attacking information is not a physical, destructive, thing).27
6228521338Viruspiece of code that attaches itself to other instructions within a computer like software application codes or booting systems.28
6228524562Distributed Denial-of-Service (DDoS) Attackstab taken by a cyber attacker to thwart the legitimate usage of a service. Destruction and changing configuration information for a system, expenditure of resources needed for legit operation, and the actual physical changing of network elements.29
6228527195Intrusionsany set of actions that endanger the integrity, confidentiality, or availability of a computer resource.30
6228562382Facilitation of attack encompassesthings such as communication via the internet by terrorist groups.31
6228564752Data Hidinga.k.a. stenography. Includes an assortment of methods for secret communications that can conceal the fact that a message even exists at all.32
6228579718Cryptographymethodology to secure and protect information from unwanted eyes and unauthorized use. Generally used in conjunction with data hiding. (think kryptonite laser eyes protecting computer information)33
6228580831Propaganda and Promotionpursued via the Internet because it remains largely unregulated and has the potential to reach so many organizations.34
6228583156Cyberterror is at its greatest whenconsidered in conjunction with other terrorist actions.35
6228585110The Russian Perspectiveview cyber capabilities as tools of information warfare, which combines intelligence, counterintelligence, disinformation, and electronic warfare, debilitation of communications, degradation of navigation, psychological pressure, and destruction of enemy computer capabilities. Similar to hacktivism, cyber aggression, and cybercrime.36
6228624894The Chinese Perspectiveinformation warfare is necessary to support their government objectives and strategy. Heavily engaged in critical U.S. infrastructure.37
6228629939Choice Theoryindividuals commit crime due to a rational choice, by weighing the risks and benefits of committing the act.38
6228636334Why was Choice Theory popular in the late 1970s?the positive school came into question, crime rates were increasing, and there was an emphasis on punishment, not rehabilitation.39
6228638760Risks of Choice Theory areapprehension and punishment, which must outweigh the benefits, to stop an individual from committing an act.40
6228642284Routine Activities Theorybased on rational choice and was developed by Cohen and Felson. Crime occurs when there is a convergence in time and space .41
62286478363 factors of the Routine Activities Theory:a motivated offender (hacker), a suitable target (a vulnerable computer system), and the absence of a capable guardian (inadequate software protection).42
6228664693Deterrencecomes from choice theory and says offenders commit crime because they make a choice to do so.43
6228668883General Deterrenceseeks to discourage would-be offenders through the threat of punishment.44
6228670082Specific Deterrencedesigned to impose a sanction on a convicted offender in order to prevent him or her from continuing to commit criminal acts in the future.45
6228676101Cognitive Development Theoryindividuals develop in a sequential manner. Kohlberg says there are sequential stages of moral reasoning.46
6228678454Stage 1 (Kohlberg)punishment and obedience orientation stage. (the obedience to power and rules)47
6228680474Stage 2 (Kohlberg)hedonistic orientation stage. (meeting one's needs & allowing others to do the same)48
6228680475Stage 3 (Kohlberg)interpersonal concordance stage. (good intentions and motives for others)49
6228680476Stage 4 (Kohlberg)law and order orientation stage. (doing duty to society)50
6228681390Stage 5 (Kohlberg)social contract, legalistic orientation stage. (upholding rules agreed upon by society)51
6228681391Stage 6 (Kohlberg)orientation to universal ethical principles stage. (obligation to principles)52
6228737135Antisocial Personality Disordera pervasive pattern of disregard for and the violation of the right of others that begins in childhood or early adolescence and continues into adulthood. Correct term for psychopath or sociopath.53
6228739842Pedophilia and Computerscomes from an interest in computers due to existing pedophilia and an interest in pedophilia as a result of viewing these types of images online.54
6228749022Strain Theorysociety instills a desire to achieve in citizens (the American Dream) and those who do not have equal opportunity are strained and more likely to be criminal.55
6228753332What does Merton identify as the goal in Strain Theory?economic success.56
6228755123Conformityaccepting goals of society and try to work harder, not deviant.57
6228763616Ritualismrejects goal of economic success, but still works hard legally.58
6228764750Innovationaccepts goal of economic success, but finds illegal ways to obtain this.59
6228766746Retreatismno goal and no work, given up.60
6228768997Rebellionno goal or means and works against the system.61
6228772157General Strain Theory according to Agnewfailure to achieve goal, removal of positive stimuli, and addition of negative stimuli.62
6228774046"Relative Deprivation"offers an explanation why white collar crimes may occur.63
62287748613 ways to copeminimizing the importance of goals, negative outcomes, or accepting responsibility.64
6228782827Social Process Theories focus onanalyzing the impact of certain factors on crime.65
6228784601Learning Theoryindividuals commit crime including computer crime, because they learn the attitudes, skills, and rationalizations necessary to commit these acts.66
6228788103Sutherland's Differential Association Theorycrime comes from social interaction.67
6228790316Aker's Differential Reinforcement Theoryprocess whereby one is exposed to normative definitions that are relatively more favorable or unfavorable to illegal or law-abiding behavior.68
6228793081Sykes and Matza's techniques of Neutralization/Drift Theorylearning can facilitate criminal behavior. Most criminals hold conventional values, norms, and beliefs, but must learn to neutralize the values before committing crimes.69
62287948835 techniques of neutralizationdenial of responsibility, denial of injury, denial of victim, condemnation of condemners, and appeal to higher loyalties.70
6228797136Subculturevalues, norms, and beliefs that differ from the dominant culture.71
6228799592What should hacking balance?secrecy and status as hacking is an illegal act.72
6228803061Virus Writers are looking for...money, fame, attention, competition, and fun. It is a learned enterprise and skills are developed through trial and error and writers are unlikely to ever meet face-to-face.73
6228825853Social Control Theoryassumes people will violate the law, but is looking into why this is so. It has been found that the strength of an individual's ties to conventional individuals and society is a factor when choosing to violate the law.74
6228829558Gottfredson and Hirschi's Self-Control Theoryargues that person's tendency to commit crimes can be found in his or her level of self-control. Instilled by age 8.75
6228832466Innovation Hackingassisting investigators and law enforcement officers in understanding the way hackers think.76
6228835626What is the most frequent online activities of legitimate hackers?communication and association.77
6228838776Youth Phenomenonthis is a normal part of life, youths are digital natives.78
6228840437Hackerindividual with a profound interest in computers and technology that has used this knowledge to access computer systems without authorization from the systems owners. Authorization is key.79
6228843885What is responsible for the creation, distribution, and facilitation of modern piracy?hacking.80
6228846177What is an example of illegitimate hacking?breaking into military and government systems and stealing millions of dollars from major banks.81
6228849123Social Engineeringbased on the use of the telephone by acquiring sensitive information from the human running the machine rather than using advanced computer skills to beat the electronic security. A confidence scam.82
6228851615What is a common form of social engineering that was popular in the 1980s?phreaking.83
6228856215Where did the term "hack" come from?MIT in the 1950s. The term for an elaborate college prank.84
6228865775What was the media and society's past fear of hackers?they were known to take control of computers and leave taunting messages to legitimate users frightening the public.85
6228902167Mass media's impact on hacking...portrayal of hackers by the media was often incorrect as they used "hacker" to describe all electronic trespassers and vandals. Often only the worst-case scenarios for hacking or network intrusion are published, and not juvenile-level hacking.86
6228923685True or false. Federal statute makes it a crime to knowingly use false credentials or access devices or a "protected" computer.True.87
6228925895Network Intrusionreading or browsing through confidential files and in doing so, creates a copy of the file. Browsing may be theft, but they did not deprive the owner of the data or the use of the data.88
6228928407Hacker Subcultureshares a set of values defined in the hacker ethic and may define the efforts to be "prosocial". They report learning experiences, including problem solving and educating others about security vulnerabilities.89
6228996228True or false. Hacking causes little criminal damage.True. Their criminal actions are based on their motives and adherence to hacker subculture values, some elements of the hacker subculture do not condone what they define as computer crime.90
6228998763Cyber criminals are mostly associated with...fraud, scamming, and embezzlement.91
6228999282Crackermalicious hacker.92
6229000999Script Kiddiestarget persons with inoffensive and uninteresting information on their websites. They are concerned with bragging and attacking each other or anyone else who draws their wrath. Use pre-made systems and will troll chat rooms.93
6229002019White Hat Hackerethical hacker.94
6229007141Grey Hat Hackerstypically behaves in ethical manner, but sometimes indulges in illicit activity.95
6229009059Black Hat Hackersa cracker or malicious hacker. May also be someone with a good deal of skill over script kiddies. Quite open with ideas, concepts, and training on new methodologies and tactics for attacking specific systems or spying with new products.96
6229013162Hacktivistsuse of hacker skills and attitudes to convey a political message.97
6229014602Benign Hackhiding the incoming university president's office door with a bulletin board. MIT origin.98
6229016171Elaborate Hackbuilding a full-sized replica police car on top if a domed building complete with a working light bar and a ticket for parking illegally. MIT origin.99
6229038271Hacker Origin1960s: hackers of this time believed information should be free to all to understand how things work and can be improved.100
6229040354Levy's Roots of Hacker Culture1. Access to computers. 2. Free information. 3. Mistrust of authority. 4. Judged by hacking. 5. Art & beauty on computers. 6. Life changing.101
6229062145Bulletin Board System (BBS)late 1970s, hackers could come together online and share and discuss information on the first personal computer communication system.102
6229072518Focus of law enforcement in the 1980s:malicious hackers as prominent hacker groups broke the law during this time, including Mitnick.103
6229076446Why is it difficult to between legitimate hacking and illegitimate hacking?human behavior is dynamic and contextual.104
62290787675 social norms of hacker subculture (tech-know-com-cat-law)technology, knowledge, commitment, categorization, and law or legality of hacking105
6229082790Knowledge is showcased at...hacker conferences.106
6229083617Commitmentthe study and practice of hacking techniques in order to show skill.107
6229084606Categorizationattitudinal components, must be in a certain state of mind or spirit.108
6229093791True of false. Concern over potential law violations appears to have little effect on hacker's behavior.True.109
6229126081What justifications are being used when speaking out about illegal applications?Warnings! were issues on Russian websites for virus writers as well as similar justifications at Defcon, especially when the presenter's content had rather obvious and serious illegal aspects.110
6229133287Espionagetheft of intellectual property (IP) for monetary gain. Prey upon technical and social vulnerabilities.111
6229134452IPa legal concept that refers to the creations of the mind (patent and art).112
6229142961Hackers focus on...functionality and stability (race to get product out $$$) without focusing on security and process control.113
6229145230Industrial Espionagethe misappropriation of trade secrets related to or included in a product that is produced for or placed in commerce to the economic benefit of anyone other than the owner with the knowledge or intent that the offense will injure the owner of that trade secret.114
6229147238Economic Espionagethe misappropriation of trade secrets with the knowledge or intent that the offense will benefit a foreign government, foreign instrumentality, or foreign agent. Includes stealing, copying, transmitting, etc.115
6229149444Corporate Espionageoccurs primarily between different types of organizations and is conducted by corporate spies infiltrating the target organization eavesdropping on competitor communications, digging though trash for discarded draft reports, and planting wiretaps on phones or computerized logging devices on accessible computers.116
6229155588Economic Espionage Act of 1996 (EEA)first federal act to define and enforce penalties for trade secret theft and implemented a fine. Corporations who suspect that they are victims of espionage schemes may request an FBI investigation.117
6229157627Espionage as a Service (Eaas)a group of sophisticated criminals (often from a cartel or family) collects as much information as possible on as many high-value targets as possible and then sells that information to as many competitors ad interested parties as possible.118
6229163801Criminal activities related to corporate espionage are prosecuted under federal statues including..the U.S. Patriot Act, Computer Fraud and Abuse Act of 1986, as well as Electronic Eavesdropping.119
6229165938FBI on lost moneywe are losing billions every year to foreign and domestic competitors and related criminal elements. They use "cover" organizations to engage in business relationships to build and abuse trust, or by other means like bribery, theft, and hacking. e.g.). The Straggler Group in the tourism industry.120
6229170185American Society of Industrial Services (ASIS)issued a survey, Trends of Proprietary Information Loss, to businesses that showed that the theft of their IP resulted in damages ranging from $10,000 to more than $5.5 million and that their IP was compromised regardless of format.121
6229171881Organized Crimeany group having some manner of a formalized structure and whose primary objective is to obtain money through illegal activities and such groups maintain their position through the use of actual or threatened violence, corrupt public officials, graft, & extortion. Usually have a significant impact on their region and attack legitimate businesses.122
6229177633What percentage of failed businesses are due to employee theft and business bankruptcies?95% of failed businesses and 30% of businesses bankruptcies are due to employee theft.123
6229186253Employee theft preys upon...a permissive environment plus a misplacement of trust. Primarily due to the misappropriation of cash and/or non-cash by employees through various forms of fraud.124
6229199142How long does it typically take for crime to be committed on the job?62 months. It takes another 32 months to be caught.125
6229214794Low and Slow Approachtaking a little over a long period of time, reduces the chance of being caught. Also called smurfing.126
6229218296Sabotagecategory of insider threat that describes an individual taking revenge against an organization primarily because they are angry. Current or former employees, contractors, business partners, or affiliates intentionally exceed or misuse authorized level of access to networks or systems with the intention of harm. 86% hold technical positions.127
6229222850Characteristics of employees that commit sabotage hold responsibilities such as:technical issues, management, and planning.128
6229230039Sabotage's number 1 motivator is adisgruntled employee with unmet expectations.129
6229236050Social media is used tocommunicate and collect intelligence. Takes advantage of e-mail as it is a transit point for a mine of information. Information is then posted on the underground market for sale, buyer may use information for many types of cyber crimes.130
6229239772Dragnets are circumvented for what reason?to communicate without being detected.131
6229243883What economic, political, and social factors in Africa helped to develop African criminal enterprises into global threats?computer waste was imported to Africa and the people there used the scraps to advance their technology.132
6229257153Nigerian Criminal Enterprise (NCE)famous for financial fraud and schemes for friendship, especially through email.133
6229259997The Nigerian Crime Initiativeuses joint task-forces in 6 major cities to stop the NCE.134
6229261463Asian Criminal Enterprises evolved fromChinese tongs which was a group of early Chinese-American immigrants in cities across the west. Often speak several languages, operate highly sophisticated criminal operations, and have extensive financial capabilities.135
6229265604Traditional Criminal EnterprisesChinese triads based in China.136
6229280444Nontraditional Criminal EnterprisesJapanese Yakuza which are based in the U.S include the Chinese tongs, triad affiliates, and Asian street gangs.137
6229282685What is the largest organized crime group in the world?Japanese Yakuza with over 100,000 registered members. Focus is on drug trafficking, gambling, prostitution, and loan sharking.138
6229286064Corporate Fashionan effort to increase efficiency and effectiveness by defining roles, reporting structure, and authority.139
6229315215What region of organized crime poses a new threat to the U.S.?Balkan organized crime. They follow traditional clan structure.140
6229318477Traditional Clan Structureclans develop in specific territories, governed by the "code", which values loyalty and secrecy. Led by a central leader who still has ties to the Balkan region.141
6229320283Eurasian Criminal Enterprisesgroup of criminals born in or with family from the former Soviet Union or Central Europe. Began in 1970s with "thieves in law".142
6229333515What are Russian groups favored cyber crimes?online fraud, which includes online banking, phishing, and other financial fraud spamming.143
6229339409Italian Organized CrimeLa Cosa Nostra (LCN) or the Mafia. Illegally came to the U.S. and in the past 200 years has become one of the most notorious and widespread of all criminal activities with approximately 3,000 members in the U.S144
6229343336What is a unique characteristic of Italian Organized Crime?they are known to collaborate with other organized crime groups and it is estimated that their worldwide criminal activities are worth more than $100 billion annually.145
6229347336What are Middle Eastern Criminal Enterprises known for?theft of financial fraud rings. Some groups have no relation to terror and are only looking to make money.146
6229349630Cybercrime is a new concept for what organized crime group?Mexican and South American drug trafficking. It is used today to make their organizations more secure, capable, and efficient. There are more problems in a face-to-face transactions147
6229357185What do Mexican cartels needs to get the best current and emerging technology and supporting infrastructure?an enormous cash flow.148
6229360105Toris needed to access the deep web. It links participating servers and websites together while encrypting all communications between each piece. Real-time criminal transactions, drug deals, weapon sales, human trafficking coordination, murder for hire contracts, and solicitations for hacker services can be found here. Other services are sold such as malware code, botnet leasing, and performing DDOS attacks.149
6229363306The Dark Web isuntraceable and difficult to access for the regular Internet user.150
62293654822 types of exploit kitsIncognito 2.0 and Bomb151
6229366493Silk Roadthe eBay of drugs and illegal contraband.152
6229369155Bitcoinsan electronically secure payment form that is digitally signed and anonymous.153
6229372803What abilities does a cyber crime master have?the ability to collect data.154
6229374092Cyber criminals are commonlymales who dress casually, are intelligent, independent, college-educated, and pale skinned.155
6229377227Drug Lords typicallypublicly display wealth, lives a materialistic lifestyle, is cold, brutish, and very likely to smoke tobacco products.156
6229382669Why is white collar crime typically ignored?it doesn't illicit the same feelings as traditional crime.157
6229403531Street Crimemade up of homicide, rape, armed robbery, and aggravated assault and is what gets media attention.158
6229406145Who was the first to distinguish between street crime and crimes of the privileged class in the late 1940s?Sutherland.159
6229407576White Collar Crimecommitted by society's elite - people with the economic wherewithal and status to shape the criminal law in their favor and avoid detection and punishment.160
6229423801The media focuses on what type of crime?blue collar crime because it makes better stories. Blue collar crime costs only $14 billion yearly, while white collar crime costs $250 billion yearly.161
6229430464Problems in white collar crime includea lack of white collar crime laws and this type of crime usually affects corporations, and the public does not feel bad for them162
6229433538Embezzlementunlawful misappropriation for personal use of money, property, or some other thing of value that has been entrusted to an offender's care, custody, or control. A violation of trust.163
6229436447Typical characteristics of an embezzlernot a person of high social status. Typically someone who managed the financial affairs of the social elite.164
6229437193How do modern day embezzlers differ from past embezzlers?used to be a female bank teller, but today, they're more likely to be men, ages 30-50.165
6229454399Cressey's 4 step process:1. Experiencing financial strain that can't be alleviated through legitimate means. 2. Alleviates their problem via embezzlement. 3. Must posses the technical knowledge to perform the act. 4. Use of "neutralization techniques" to overcome lingering guilt.166
6229462632Is embezzlement a "computer-assisted" crime or a "computer-focused" crime?a "computer-assisted" crime.167
6229466319The modern day embezzler isan "internal perpetrator" or an authorized user of computer systems who uses legitimate access to computer files to commit theft.168
6229468740The advent of technologically driven financial management techniques may have...narrowed the pool of potential embezzlers to those individuals who possess the special ability to do this.169
6229470099Corporate Espionageany theft of proprietary business information through spying or deception, particularly the theft of "trade secrets". Targeted in civil courts.170
6229482520Trade Secretsany proprietary information that is of value to a commercial enterprise because that information provides a competitive advantage over business rivals.171
6229486217Corporate Insiderspersons who have legitimate access to a company's computer networks, such as employees, information technology personnel, or corporate executives. 85% carried out by insiders. May use information for blackmail money.172
6229487310Corporate Outsiderspersons who crack into a corporation's computer data networks without any form of legitimate access of rights.173
6229488905Ubiquitous email use hasemployee exchanges readily accessible corporate data available to cyberspace hackers.174
6229503089EEA 1st offense targetsand attempts to enforce espionage crimes originating from foreign governments and businesses by creating criminal penalties for those who engage in these acts.175
6229503984EEA 2nd offense targetsand enforces domestic espionage between competing U.S. firms by making the theft of trade secrets involved in interstate commerce a federal crime.176
6229505535Money Launderingthe act of concealing the source of assets that have been illegally obtained. Primary objective is to hide the source and ownership of such funds through the creation of a seemingly legitimate history or paper trail.177
6229860318Traditionally money laundering was accomplished throughcash that was illegally obtained and could be physically transported. The launder could quickly transform hard currency into legitimate real property like real estate or commercial interests. Launderers also turn to a method called "smurfing" which involves the division of large amounts of cash into smaller denominations so as to conceal its common origin178
6229876196What are 2 primary cash transfer institutions?FedWire (federal government) and CHIPS (private banking companies).179
6229880573e-cashan electronic replacement for cash. Law enforcement fear that the increasing use of cashless systems may promote unique "cyberlaundering" schemes that are more difficult to detect and defend against.180
6229884627Bank Secrecy Act of 1970 (BSA)requires banks and other financial institutions to file records concerning suspicious financial transactions over $10,000. 1986 Money Laundering Control Act works to close certain loopholes in the BSA.181
6230267417Skimming Devicesattached to ATMs and read credit card numbers and record the data. Sold in carding markets.182
6230349480Violations of the Identity Theft and Assumption Deterrence Act may be punishable by up to how many years?15 years in prison.183
6230388537Fraud schemes committed over the internet are simplynew takes on old themes. Chain letter hoaxes, confidence schemes, and bait-and-switch con games are now performed over an electronic medium.184
6230394709Financial Institution Fraudattempts to conceal the truth from deposit and lending institutions to gain money.185
6230413294Confidence Schemesmost common and involve a breach of personal trust.186
6230414417Online Auction Fraudwidely reported Internet fraud by a large margin.187
6230419918Phishingattempt to lure or hook potential victims to fraudulent websites for the purpose of gathering sensitive personal information. Usually says an account has been compromised or needs maintenance.188
6230486823True or false. There is no centralized data base that collects information on the damage viruses leave.True.189
6230487819More time, energy, and resources, are spent on what than anything else?anti-virus software. Viruses create fear for the general public, and fear sells security systems.190
6230492051Psuedo-Virus Experta person who proclaims expertise in office workgroups around the world, claiming they know about viruses and how to prevent them. False-authority syndrome.191
6230496492Fusion of Responsibilitysomeone else will do it, or it won't be me.192
6230502406How to virus writers attack systems?they are opportunistic and chose to attack systems at their weakest and most vulnerable points.193
6230504119Damagemost important variable of a virus or malicious code; graded based on the potential damage they can do.194
6230504644Level of Vulnerabilityability of the attacker to execute commands on a victim's computer or network, the ability to access data on a remote system, ability to take control of a system and assume another identity, and ability of the attacker to deny service to legitimate traffic on a given system or systems. The weak point of software.195
6230531126Exposure to Vulnerabilitiesease for the attacker. Potential problems or security holes that are present that would allow an attacker to exploit the vulnerabilities.196
6231726512Wildnessmeasures the extent to which a virus is spreading among computer users and systems.197
6231731059What programs are like any other program and are designed for a specific functions?viruses and malware. They are written for a variety of noncriminal purposes.198
6231737808The development of virus construction tools by virus writers allows what?allows a large number of less sophisticated computer users to write and create viruses.199
6231744184Virus Construction Seta utility program intended for creating new computer viruses.200
6231747435Encryptionthe scrambling or encoding of data to prevent reading or tampering with the data. Requires a password or key and can also use "stealth".201
6231751808How does destructiveness vary?from virtually harmless to extraordinarily dangerous and malicious.202
6231755789When was the first virus discovered?may have been in the late 1960s on early versions of Univac and IBM machines, known as "rabbit" programs. Modern virus was found in the 1980s, correlating with the growth of the PC industry.203
6231757317How were early viruses spread?early viruses infected boot sectors and floppy disks and were easy to detect.204
6231767799Braina boot sector virus that was sent out to see how far it would spread and spread via floppy disks.205
6231774515The spread of viruses increased because...rapid growth of the Internet, rapid growth and availability of PCs, the availability of the polymorphic engine, and the availability of virus creation tools that first hit in July of 1992.206
6231778848How are viruses categorized?by the environment they operate in, the operating system they are targeted at, type of encryption and operating algorithms, and destructiveness.207
6231785795File Virusesuses a particular operating system to propagate by parasite, companion, or through link viruses, and infects any type of file, overwrite.208
6231788175Boot Virusesattacks boot sector of the system. Operates based on algorithms of starting an operating system upon power on or reboot, after the hardware test, the system reads the boot disk, and passes control to the virus.209
6231790185Macro Virusesmost commonly associated with business software and infect documents, spreadsheets, databases, and presentation files. Takes advantage of macro languages built into common business software (e.g. Microsoft Office). It creates a new macro, and then redefines one or several of the standard macro.210
6231792491Network Virusesattack networks themselves or e-mail systems of the networks in order to spread themselves. Main operating principle is its capability to transfer its code to a remote server or workstation on its own.211
6231794991Wormstand-alone piece of code. Term came from Shockwave Rider. It copies itself from one disk to another or copies itself using e-mail or another transport method. May damage or compromise the security of the computer.212
6231800685Morris Worm (1998)crippled the internet for several days and exploited buffer overrun flaws. Supposed to run slowly.213
6231802033Trojan Horseunauthorized program contained within a legitimate program that performs functions unknown and unwanted by the user. Usually masquerades something desirable like a joke program or legitimate software program.214
6231804601How does a Trojan Horse work?a hidden program waits for some computer event to occur, a data to be reached, or some other type of trigger, and then delivers its payload.215
6231807987Can a Trojan Horse copy itself?it does not replicate nor does it copy itself, but causes damages or compromises the security of the computer. Can also be viruses or remote control programs that provide complete access to a victim's computer and makes it one of the most accessible weapons that hackers use for an attack.216
6231809843Adwareprogram that is essentially a pain to the user that manifests itself in several ways including changes to the browser, redirecting start up pages, replacing the search functions within the browser and generating pop-up ads and frames that are difficult to shut down.217
6231812227Spywareapplications that send information via the internet to the publishers or programmers for marketing purposes without notification to users.218
6231814703Where is spyware typically installed?installed in some functional software and takes advantage of the fact that many software users do not read the end user license agreement or fine print.219
6231815694Cookiesis a file that contains information about a program, web site, use, or the user's computer.220
6231816581DoS Attackuses multiple systems to attack one or more victim systems or website with the intent of denying service to legitimate users wishing to log on or utilize the attacked server. Sends a phony request to the server and overloads it and prevents legitimate traffic. Remarkably effective.221
6231821192Zombie Machinesused to perform a DoS attack and is compromised on university campuses.222
6231825582Blended Threatscombines the characteristics of viruses, worms, Trojan horses, and malicious code with server and internet vulnerabilities to initiate, transmit, and spread an attack. Use multiple methods to rapidly spread and cause widespread damage.223
6231828598What is the essence of a blended attack?multiple payloads and multiple targets. Experts predict an increase in this.224
6231835313Botnetsreach very large sizes and may include 1,000s of machines enabling bot operators to engage in a variety of different acts.225
6231838306An attackers' main motive is what?acquiring information and data to steal money. Significant profit motives.226
6231843883What stages of profession do virus writers go through?go from students and schoolchildren to college students and young adults to professional virus writers. At each stage, destructive capability and technical expertise increases.227

Need Help?

We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.

For general help, questions, and suggestions, try our dedicated support forums.

If you need to contact the Course-Notes.Org web experience team, please use our contact form.

Need Notes?

While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!