Cybercrime Flashcards

1
Q

what it includes

A

Cybercrime includes:
Offences ranging from criminal activity against data to content and copyright infringement (Council of Europe’s CC Treaty)
United Nations refers to acts of fraud, forgery and unauthorized access

Unlawful acts wherein the computer is either a tool or a target or both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

National Security Strategy: Priority Risk (Tier One)

A

The UK National Security Council considered the following groups of risks to be those of highest priority for UK national security looking ahead, taking account of both likelihood and impact.

International terrorism

Hostile attacks upon UK cyber space by other states and large scale cyber crime

A major accident or natural hazard which requires a national response

An international military crisis between states

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

National Security Strategy: Priority Risk (Tier Two)

A

The National Security Council considered the following groups of risks to be the next highest priority looking ahead, taking account of both likelihood and impact. (For example, a CBRN attack on the UK by a state was judged to be low likelihood, but high impact.)

An attack on the UK by another state or proxy using chemical, biological, radiological or nuclear (CBRN) weapons

Risk of major instability, insurgency or civil war overseas which creates an environment that terrorists can exploit to threaten the UK

A significant increase in the level of organised crime affecting the UK

Severe disruption to information received, transmitted or collected by satellites, possibly as the result of a deliberate attack by another state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

UK Cyber Security Strategy 2011 (Vision)

A

Our vision is for the UK in 2015 to derive huge economic and social value from a vibrant, resilient and secure cyberspace, where our actions, guided by our core values of liberty, fairness, transparency and the rule of law, enhance prosperity, national security and a strong society.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

UK Cyber Security Strategy 2011 (Objectives)

A

Objective 1:
The UK to tackle cyber crime and be one of the most secure places in the world to do business in cyberspace

Objective 2:
The UK to be more resilient to cyber attacks and better able to protect our interests in cyberspace

Objective 3:
The UK to have helped shape an open, stable and vibrant cyberspace which the UK public can use safely and that supports open societies

Objective 4:
The UK to have the cross-cutting knowledge, skills and capability it needs to underpin all our cyber security objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Computer Virus

A

Program which can copy itself and surreptitiously infect another computer, often via shared media such as a CD, USB drive, shared directory, etc. Viruses are always embedded within another file or program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Worm

A

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trojan

A

program which purports to do one thing, but secretly does something else; example: free screen saver which installs a backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Root Kit

A

set of programs designed to allow an adversary to surreptitiously gain full control of a targeted system while avoiding detection and resisting removal, with the emphasis being on evading detection and removal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Botnet

A

set of compromised computers (“bots” or “zombies”) under the unified command and control of a “botmaster;” commands are sent to bots via a command and control channel (bot commands are often transmitted via IRC, Internet Relay Chat).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spyware

A

assorted privacy-invading/browser-perverting programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware

A

software which is specifically designed to disrupt or damage a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing

A

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hacking

A

gain unauthorized access to data in a system or computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Case study: Conficker

A

In 2008, Microsoft Windows computers began being infected by an advanced worm called Conficker, which spread when users shared files, either over networks or via USB flash memory drives.

The malware disabled important security features, such as antivirus software and automated update systems and blocked users from downloading fixes. Conficker’s authors clearly were not amateurs.

They regularly released new variants to overcome weaknesses in the original malware and took steps, (including using digital signatures), to ensure that no one else could hijack their program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Case study: Target

A

In December 2013, the American retailer Target announced that hackers had stolen data belonging to 40 million customers.

The attack had begun in late November and continued for several weeks before it was detected. By then it had compromised more than 110 million accounts, including unencrypted credit and debit card information as well as encrypted PIN data.

By February 2014, American banks had replaced more than 17 million debit and credit cards at a cost of more than $172 million.

The amount of fraud linked to the attack is unknown, as is the damage to Target’s reputation.

17
Q

Case study: Anonymous

A

Four British men involved in a string of cyber attacks on high-profile organisations in the UK and US have been jailed today, 16 May, following a joint operation by the MPS Police Central e-Crime Unit and FBI.

Southwark Crown Court heard how Ryan Cleary, Mustafa Al-Bassam, Jake Davis and Ryan Ackroyd - all members of hacking group Anonymous - met online and created offshoot group LulzSec with a fifth man living in the US and a number of other unidentified people.