A virus is an executable code usually sent in an e-mail attachment or hidden in audio clip, video clip, or game. Viruses can corrupt files, control applications, and erase a hard drive simply by sharing a file. A worm is an executable code that spreads by infecting files over a network. Worms normally do not require user action, to populate and they do not need attachment to another program or file. Once a virus or a worm releases itself, it will spread quickly.
Spyware is almost exactly as it sounds, a spying program. This type of malware will record the users input and transmit it back to the hacker to access at his leisure. This type of spyware is called a key logger and can capture interesting information such as user names, passwords, credit card numbers and email addresses. The more advanced versions of spyware can siphon off network data that will allow the hacker access to files, encryption keys, and other sensitive information. The final malware I will cover is the zombie.
Cyber terrorists can be motivated to target organizations that will result in the radical’s group to cause the most harm and/or receive the most attention for their party. Cyberterrorists use the internet to spread propaganda and enlist new members and use DoS/DDoS attacks to cause disruption to companies that represent actions against their belief’s (Vacca & Rudolph, 2011). Cyber terrorists can also steal information to be used for self-serving strategic purposes. Kostadinov (2012) makes the distinction between cybercrime and cyberterrorism in that the latter should resemble terrorist attacks via traditional methods but perpetrated virtually. Kostadinov goes on to note that most cyberterrorism actions are generally focused on website sabotage and email blasting.
Match the attacks on the left with the vulnerabilities on the right that allows each attack to succeed. 1. An attacker is able to launch a denial of service (DoS) attack from a single computer that has attacked you before. 2. An intern can access several user accounts after learning their birthdays and pets names.
Cyber Crimes Jennifer Bell Investigating Cyber Crime CJ316-01 Professor Stewart January 14, 2014 In this essay we will look at the KKK a domestic terrorist group, we will look at how they have used technology to further their agenda. We will also look at a couple of case of identity theft and ways that the victims may have been able to protect themselves. The KKK, a name that has been around for many years and their message never changes. However they now have more means to deliver their message to the people, the internet gives them a broader audience to spread hate. They have a website that shares all of their information about saving the race and nation.
Tien Nguyen Per.3 May 1, 2015 The Surveillance Used by Big Brother The surveillance in the book 1984 has many similarities to our government and society today. The government can spy on us by looking at our texts and what we doing on the internet anytime they want. They also look at us through video recording from stores and street. Police have also been found to violate our privacy as well. Advancements in technology have revolutionized the way we as a society communicate and function.
The Internet: a Clear and Present Danger summary Only a couple of clicks of a mouse can ruin your life. The Internet a seemingly harmless software is full of scams, and graphic video and photos. With a few clicks of the mouse you can give all important information away. Cathleen A. Cleaver wrote this essay entitled The Internet: a clear and Present Danger. In this essay she writes about Children and the internet, pornography and the internet, internet transactions, technology must serve man.
Winston turned a switch and the voice sank somewhat, though the words were still distinguishable. The instrument (the telescreen, it was called) could be dimmed, but there was no way of shutting it off completely. (1.1.3)” So don’t be surprised if the FBI shows up at your door because you searched something that the NSA can consider an act of terrorism. In all of this info just realize that the government has complete control of its citizens no matter what the constitution says they have what they think is considered a high power. These ideas are great but can be wrong in the wrong hand.
Firewalls are good and help against websites that are illegitimate. It’s also good to have an antivirus on your computer to help protect against people who are trying to hack into your system. Perhaps someone is trying to gain access to your financial information; the antivirus stops them from getting in. Always make sure that when you are checking your e-mail and receive an e-mail with an attachment if you do not know who it is from do not open it. I don’t even open e-mails from people I don’t know whether it has an attachment or not.
The ping sweeps and port scans are the two techniques that malicious computer users such as hackers that can use to compromise an Enterprise networks security and gain access to their proprietary data. The ping sweeps are performed to find an open-door into a particular end-point. A person usually can find all kinds of utilities on the internet to exploit the open-doors on the system and gain access to important and confidential files on the network. It is a good idea that we try to protect ourselves against all these types of activities on the network and to also try to conduct them ourselves that way we know that out networks are safe. The ping sweeps are what you really think they are.