Chapter 1 Flashcards

(26 cards)

1
Q

Cyber crimes

A

Inspire fear in consumers and lead to lack of trust and security in e-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Traditional criminal acts performed on computers

A

Child porn

Financial crimes

Corporate espionage

Exploitation

Stalking

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cyber

A

“Real” or “virtual” attached to a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware

A

Short for malicious software

Referred to as computer contaminant

Viruses, worms, Trojan horses, spyware, adware, other destructive software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Major complications of cyber crime

A
  1. Increased dramatically in recent years
  2. Significant inconsistency in defining computer crime offenses
  3. No systematic data collection procedures for cyber crime
  4. Offenses vary greatly in character
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Developmental perspective

A
  • much has changed since computers first introduced, few experts explored potential to use computers to commit crimes
  • most research focusses on mechanic techniques of computer crimes and not offenders and offenses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pioneer in early computer crime research

A

Donn Parker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Popular publications of cyber crime

A

The Cuckoo’s Egg, Takedown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Two trends that drive increase of cybervictimization

A
  1. Increase use of computers

2. Increased availability of technical info on virus creation and hacking techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Greatest threat?

A

Insiders

Outsiders is growing problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

National Infastructure Protection Center (NIPC)

A

Infers cyber crime and cyber terrorism are in same track (parallel)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Costs of cyber crime

A
  • derived from surveys of corporations and agencies
  • difficult to accurately calculate
  • companies often underreport
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1988 joint survey by FBI and Computer Security Institute

A

3 years in a row corporations had increased outsider penetration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Classification of computer (cyber) crime

A
  • further defines topic, keeps everyone same page
  • provides more opportunities to demonstrate topic through specific and noteworthy examples
  • should fulfill needs of law enforcement with motives and apprehension
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Carters classification of computer crime:

Computer as a target

A

Computer itself is target- include denial of expected service (DoS)

-2016 summer Olympics, Trump/Hillary

Ex) data alteration, network intrusion, computer vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Carters classification of computer crime:

Computer as instrument of crime

A

Computer is used to gain criminal objective

-exploits trust

Ex) theft, fraud, threats, harassment, bullying

17
Q

Carters classification of computer crime:

Computer is incidental to crime

A

Computer facilitates crime

Ex) money laundering, criminal enterprise, child porn, luring victims

18
Q

Carters classification of computer crime:

Crimes associated with prevalence of computers

A

Even those who avoid technology can be victims

Ex) intellectual property theft, counterfeiting, identity theft

19
Q

Gordon and Ford classification of computer crime:

Type 1 offenses

A

Primarily technological in nature

Involves:

  • single and discreet event from POV of victim
  • uses malware
  • can be, but mostly may not be, facilitated by computer software vulnerabilities
20
Q

Gordon and Ford classification of computer crime:

Type 2 offenses

A

Do not involve malware

Generally involves repeated contacts or events from POV of victim

Does not usually involve use of software

Ex) cyberstalking, harassment, child porn, extortion

21
Q

Anderson classification of cyber crime (2012)

A
  • primarily to derive estimate of cost
  • traditional crimes that are now considered cyber
  • transitional crimes have changed with advent of internet
  • new crimes have originated since internet
  • crimes that facilitate other crimes through misuse of computers
22
Q

of internet connected devices

A

Estimated over 87 billion

23
Q

Internet experiences explosive growth in

24
Q

Industrialization

A

Has a connection to increased commercial activity

25
Van Duyn 1980’s
Suggested insider threats were far more serious than outsider
26
Barrett
Offers insight about range, capacity of computers to be used as both criminal instruments and instruments of warfare