chapter 11 part 1

Cards (47)

  • Computer Security
    The protection of computing systems and data from unauthorized access, change or destruction
  • Computers could be used for
    • Upholding laws
    • Breaking the laws
  • Upholding laws

    • Computer forensics
  • Breaking the laws
    • Viruses
    • Identity theft
  • Cybercrime
    Any crime using computers or networks
  • Billions of dollars are lost due to cybercrime
  • Majority of cybercrimes are conducted by company insiders
  • Insider crimes are covered up to avoid embarrassment
  • Cyberstalking

    To repeatedly harm or harass people in a deliberate manner on the internet
  • To help yourself against cyberstalking

    • Limit how much personal info you share
    • Stop cyberbullying
  • Cyberbullying

    Targeting children and young adults online, involves humiliation, rumors, lies, taunts or threats
  • Intellectual Property Theft

    • Software Piracy
    • File sharing of copyrighted songs
    • Illegal duplication and distribution of movies
    • Plagiarism of copyrighted text
  • What is stolen in cybercrime
    • Money
    • Goods
    • Information
    • Software Resources
  • Spoofing
    Trick that targets to extract secret information
  • Spoofing
    • Making a phone call and posing as an internet technician, to extract sensitive data especially passwords
  • Shoulder surfing
    A type of social engineering technique used to obtain information by looking over the victim's shoulder
  • Shoulder surfing
    • Passwords and other confidential data
  • Phishing
    The act of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication
  • Phishing
    • Sending an email posing as a bank representative and asking to fill a fake bank web form
    • Adult sites asking users to reveal credit card numbers to prove age
  • Identity Theft

    Extract personal information to commit a crime in another person's identity
  • Information stolen for identity theft

    • National ID
    • Driving License
    • Credit card number
  • Identity theft protection
    • Use separate credit card for online use
    • Use secure websites (https://)
    • Don't disclose personal info on phone
    • Handle email with care
    • Copy your cards to get replacement in case stolen
    • Report Identity theft promptly
  • Malware
    Malicious Software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems
  • Types of Malware
    • Viruses
    • Worms
    • Trojan horses
    • Spyware
    • Ransomware
  • Viruses
    Are attached to a file/program and spread when files are exchanged via email attachments or flash drives
  • What viruses do when executed
    1. Damages the Operating system
    2. Destroys or steals data
    3. Display annoying pop-up messages
  • Viruses may be OS specific but newer types are cross-platform
  • Macro viruses
    Attach themselves to documents containing macros (a set of commands to automate repetitive tasks)
  • Macro viruses

    • MS Office files, Melissa virus (1999)
  • Worms

    They are independent programs capable of reproducing themselves
  • Worms
    • Causes memory freezes
    • Spreads through the internet slowing it down
  • Famous worm
    • Code Red (2001)
  • Trojan Horse
    Disguise themselves as useful programs or apps, but has hidden destructive program (viruses)
  • Trojan Horses

    • Often posted in shareware
    • Names sound like games or utilities
    • Act as a backdoor allowing the attacker to control your PC to delete/change/share data
  • Trojan Horse
    • Time bomb – triggered by a date or time-related event
  • Spyware
    Gets installed and collects information without user's knowledge
  • Spyware
    • Slows down PC performance
    • Tracks keystrokes
    • Tracks web sites visited
    • Tracks screen displays
  • Ransomware
    Malware that locks your computer and encrypts data in your hard drive, demands that you pay a ransom to unblock the files again
  • How to get infected by Ransomware
    Open an infected email attachment or malicious link
  • Attackers usually ask you to pay the ransom using digital currencies, such as Bitcoin because it is untraceable</b>