Part 2 Flashcards
(70 cards)
The Budapest Convention on Cyber Crime provided the four general types of cybercrime:
• Offenses against the confidentiality, integrity and availability of computer data and systems,
• Computer-related offenses
• Content-related offenses
• Copyright-related offenses
when someone gains access to a website, program, server, service, or other system using someone else’s account.
Unauthorized Access
Any attempt to intrude into a computer or a network without authorization. This involves changing of system or security features in a bid to accomplish a goal that differs from the intended purpose of the system.
Hacking
It can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes.
Hacking
An individual who involves themselves in hacking activities is known as?
Hacker
It can be described as gaining unauthorized access to a computer system by improper means.
Hacking
It can be describes as gaining access to a computer system using usual means of access but without consent.
Unauthorized Access
What are the various kinds of hackers?
White hats
Black hat hackers
Gray hat hackers
General classification of Cybercrime
Unauthorized access
Hacking
Cracking
Cyber fraud
White hats is also known as?
Ethical hackers
Criminal by definition
Black hat hackers
They belong to neutral zone
Gray hat hackers
They strive to operate in the publics best interest, rather than to create turmoil.
White hats
Many _________ work doing penetration, to attempt to break into the company’s networks to find and report on security vulnerabilities.
White hats
this kind of hackers, hack to take control over the system for personal gains. They destroy, steal and even prevent authorized users from accessing the system
Black hat hackers
They act in the middle ground between white hat hackers, who operate on behalf of those maintaining secure systems, and sometimes act as black hat hackers who act maliciously to exploit vulnerabilities in systems.
Gray hat hackers
It means breaking into a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
Cracking
They also act as Black Hats by gaining access to the accounts of people maliciously and misusing this information across networks.
Crackers
It is the process of intruding computer systems without authorization in order to gain access to them, for good or bad purposes
Hacking
It is breaking into the security system for criminal and illegal reasons or for personal gains only.
cracking
Common types of Cracking
Software cracking
Network cracking
Password cracking
- It is done to remove paid software requirements or pop-up purchase reminders so that people can access the software for free. “Cracked” software is a paid program that has had its copy protections removed.
Software cracking
It is the act of infiltrating a local area network (LAN). Sometimes referred to as web cracking or wired equivalent privacy (WEP) cracking, this usually involves accessing poorly secure networks.
Network cracking
It is the act of stealing people’s passwords from databases.
Password cracking