Chapter 13 Flashcards

(25 cards)

1
Q

What is Cybercrime?

A

Describes criminal activites in which a computer or network of computers is an integral part of the crime

Less back up exists today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The role of Digital Devices in Cybercrime

A
  • Object: computer or network is target
  • Subject: Computer used to commit crime
  • Tool: Computer is integral to the act
  • Symbol: Computer adds credibility or is used to deceive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Difference between Computer fraud and Computer Crime

A

Computer Fraud
- Accces occurs with intent to execute a fraudulent scheme

Computer crime
- hardware, software or data is destroyed or manipulated die to acts which are not intended
- computer assisted crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Economic vs Special loss Related to Computer Crime

A

Economic Loss
- responding to illegal acts
- conducting a damage assessment
- restoring data or program to OG condition
- Consequential Damages Occurred

Special Loss
- An actual effect on medical care
- Physical injury health or safety
- Threat to public health or safety
- Damage to a computer related to the administration of justice, national defense or national security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital Currency & Money movement

Where do transfers , why examinations hard, Digi currencies, blockchain

A
  • Transfers of money from one party to another take place anywhere in digital space
  • makes financial acitvity examination complicated due to hard to collect evidence
  • Digital currencies: Bitcoin, Lite coin, Ethereium, Zcash, Dash, Ripple and Monero - Bitcoin leads
  • Digital currencies grounded on Blockchain tech - distributed ledger tech in which each transaction digitallly signed to ensure authentiticity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How Block Chain Works

A

Each transaction digitallly signed to ensure authentiticity
* Digital ledger entries distributed among deployment or infrastructure - nodes and layers to provide consenseu
* When transaction enters blockchain, nodes must execute to eval and veify the history of indiv block chain proposed
* signature must be valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Insider Threats?

Fraudster traits

A

Threats to infosystems coming from employees inside org with opportunity to commit

Traits: intelligent, hardworking, minimal absences, bored with the routine, egotistical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to commit computer fraud?

A
  1. Alter of input
  2. Alter of output
  3. Data file manipulation
  4. Comminications systems Disruptions
  5. Operating Systems Modifications
  6. Computer ops policy violation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Indicators of Insider Computer Fraud

A
  • Access privileges beyond those required to perform assigned job function
  • Exception reports not reviewd
  • Access logs not reviewed
  • Production programs run at unusual hours
  • Lack of Separation of duties in the data center
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital Device Hacking

what is a hacker, how, most direct way

A

Hacker - someone seeking unauthorized acess to computer systems and the info contained

Use rogue sofware apps to penetrate a system

Most direct way of access digital device, use someone elses id & password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Social Enngineering?

A

Simple deception to gain access to info
- Pose as new or temp worker to gain info
- Pose as someone in a position of authority and intimidate employees into revealing confidential info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Viruses?

A

Attack software
- Hidden computer programs that shut or slow down system
- Can ruin data & destro computer
- Can overload e-mail netowrks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Virus Carriers?

A
  • Iknown software
  • Media brought in by employees
  • Program downloaded with bullentin board
  • Unsolicited emails
  • Vendors with infected software
  • Shared program Application
  • Demonstration software
  • Social media links
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Indicators of Virus

A
  • Dramataic decrease of free space
  • Sudden slow down
  • increase in size of some file
  • unexpected number of disk acces
  • unpredictable program behavior
  • Unuaul messages and graphics
  • Inability to boot
  • Inability to access files
  • Unexplained repairs System or data files disappear
  • Unexplained changes in memory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Antivirus Software

A

Detect Viruses and malware
Traditional Scanners
- Look for known viruses
- Check for recognizable patterns
- Limited usefulness

Heuristic Scanners
- look for unknown viruses
- inspected executable files

Behavior blocking scanners
- Run continuosly
- look for behavior linked to virus activity

Check detection scanners
- check for changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to Investigate Virus Infections

A
  • Isolate the system
  • Run antivirus software
  • Document findings
  • Interview system custodian and all user
  • Audit trail infection
  • Determin the source
  • Protection Policies
  • Countermeasures
  • Track costs/ damages
17
Q

Common Internet Schemes

A

Old frauds adapted for digital devices and the internet - new threats for digi devices
1. Internet
2. fake check scames
3. prize/sweepstakes
4. Recovery / refund company
5. Advance fee loans
6. Phishing/spoofing
7. Cimputer: equipment/software
8. Scholarship and grants
9. Frienship and Sweethear swindles
10. Charitable Solicitations

18
Q

How to combat Internet Fraud

A
  • Encrypt confidential info
  • user validation
  • Do note store fin info and customer data on web server
  • Firewalls: attempt to prevent unauthorized access and control interaction btw servers and internet
19
Q

AI Contribution

A
  • Extremely accurate, replacing human abilities
  • Ability to sort through complex data and ambiguos situations
    *
20
Q

Biases in human decision making

A
  1. Availability and recency effect
  2. Confirmation bias
  3. Anchoring conclusion to prior belief
21
Q

What are botnets?

Use of botnets

A

Collection of tens of thousands of computers put together by organized cybercriminal enterprises

Use:
- launch denial of service attacks on enterprise websites
- Extor companies
- Distribute scam, or malwayre in mass quantities

Unprotected computers can become a part of botnet

22
Q

What makes the internet attractive for Criminal Enterprises?

A
  1. Profit by stealing and selling info
  2. Worldwide reach
  3. Internet is relatively anonymous
  4. Beyond the difficulty of catching cybercriminals is successfully prosecuting them
23
Q

Money Laundering in Cyberspace

A
  1. Internet banking makes following money more difficult
  2. Enhanced by anonymity
  3. accessed any where in the world
  4. Monitoring is nearly impossible
  5. 500 billion annually
24
Q

How to combat money laundering?

A
  • Identify and reduce ability of anonymous fin transact
  • Map global pmt systems
  • Facilitate international info sharing
  • Require know your customer policies
  • Harmonize and coordinate international money movement regs
25
Who to report Cybercrime to?
1. Fed law enforcement agencies: FBI, secret service, ICE, postal inspection, alcohol, tabocco, firearms and explosives 2. Internet Crime Complaint Center: reporting mechanism for victims, aler the authorities 3. National white collar crime center: Research internet related crim complaints