Part B : 5.13 IS Attack Methods & Techniques Flashcards

1
Q

Who developed the fraud triangle?

A

Criminologist Donald R Cressey in the 1950’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What did Cressey believer were the 3 key elements in the fraud triangle?

A

1) Motivation - perceived financial (or other) need
2) Rationalization - the way the fraudster justifies the crime to themselves
3) Opportunity - method by which the crime is to be committed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is opportunity for fraud created?

A

By abuse of position and authority, poor internal controls, poor mgt oversight.

Opportunity is the element over which organisations have the most control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can opportunity to commit fraud be limited?

A

Can be limited by security controls such as logical access controls, segregation of duties, human resource security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the threats to the business as a result of computer crimes?

A

1) Financial Loss
2) Legal repercussions
3) Loss of credibility or competitive edge
4) Blackmail, industrial espionage, organised crime
5) Disclosure of confidential, sensitive or embarrassing information
6) Sabotage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Hactivism?

A

Occurs when perpetrators make non violent use of illegal or legally ambiguous digital tools in pursuit of political ends.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is important for IS auditors with regards to computer crime?

A

Important to understand what constitutes computer crime and what constitutes computer abuse.
What constitutes a crime depends upon jurisdiction and court sentence.
Certain breaches of security may be civil or criminal offences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who are possible perpetrators in computer crime?

A

1) Hackers (crackers)
2) Script Kiddies
3) Employees
4) IT Personnel
5) End Users
6) Former Employees
7) Nations
8) Interested or educated outsiders - competitors, terrorists, organised crime, -breakers
9) Part-time and temporary personnel
10) Third parties
11) Opportunists - info is inadvertently left unattended or left for destruction and a passerby can access it
12) Accidental unaware - someone who unknowingly perpetrates a violation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a script kiddie?

A

Individuals who use scripts and programs written by others to perform their intrusions and are often incapable of writing similar scripts on their own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Source of the attack: Computer is the target of the crime.

Describe
Target of attack
Examples

A

Perpetrator uses another computer to launch an attack

Specific identified computer

Denial of service (DOS)
Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Source of the attack: Computer is the subject of the crime.

Describe
Target of attack
Examples

A

Perpetrator uses computer to commit crime and the target is another computer

Target may or may not be defined. Perpetrator launches attack with no specific target in mind.

Distributed DOS
Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Source of the attack: Computer is the tool of the crime.

Describe
Target of attack
Examples

A

Perpetrator uses computer to commit crime but the target is not the computer

Target is data or information stored on the computer

Fraud
Unauthorised access
Phishing
Installing key loggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Source of the attack: Computer symbolises the crime.

Describe
Target of attack
Examples

A

Perpetrator lures the user of computers to get confidential information

Target is user of computers

Social engineering methods:
- phishing
- fake web sites
- scam mail
- spam mail
- fake resumes for employment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 4 sources of attacks in computer crimes?

A

1) Computer is target of the crime
2) Computer is subject of crime
3) Computer is tool of the crime
4) Computer symbolises the crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly