Discussion 3 Flashcards
(35 cards)
a remote access program that allows hackers to control computer systems.
“Deep Throat,”
originally referred to modifying technology for creative uses, but it has since become associated with cybercrime.
“hacking”
is an ever-growing threat, but awareness and good cybersecurity practices can help minimize risks.
Cybercrime
is harmful software designed to damage, disrupt, or gain unauthorized access to a computer system.
- Malware (Malicious Software)
- Allow hackers to bypass security and gain unauthorized access.
Backdoors
- Disguised as legitimate programs but execute hidden malicious functions.
Trojan Horses
- Self-replicating programs that corrupt files and disrupt system functionality.
Viruses
- Spread independently through networks, often causing widespread damage.
Worms
- Malicious software hidden within seemingly harmless downloads.
Bundlers
- Overload systems to prevent legitimate access.
Denial of Service (DoS) Attacks
- Infected devices controlled remotely to carry out large-scale attacks.
Botnets and Zombies
- Monitors user activities and collects sensitive data without consent.
Spyware
- Record every keystroke to capture login credentials and personal details.
Keyloggers
-Analyze and intercept network traffic to steal confidential information.
Sniffers
Cybercriminals often trick people into providing personal information through deception.
- Phishing and Social Engineering
- Fraudulent emails impersonating legitimate entities to steal data.
Email Phishing
- Faking identities, emails, or websites to gain trust and extract sensitive details.
Spoofing
- Redirecting users to fake websites that collect login credentials.
Pharming
- Malicious programs that alter web traffic to fraudulent sites.
Redirectors
- Scams promising large financial rewards in exchange for personal details or payments.
Advance-Fee Fraud (419 Scams)
- Fake browser windows that imitate real websites to steal information,
Floating Windows
A panel of experts was formed to study transnational cybercrime and recommend legal actions.
Council of Europe (1985-1989):
Adopted a resolution urging member states to ensure their legal systems could handle cybercrimes.
United Nations (1990):
A UN agency that focuses on information and communication technology laws to combat cybercrime.
International Telecommunications Union (ITU):