CIS 170 Midterm Exam Solution https://hwguiders.com/downloads/cis-170-midterm-exam-solution CIS 170 Midterm Exam Solution • Question 1 Data alteration and denial directly targets the computer by attacking the useful information stored or processed by the computer. • Question 2 Child pornography is an example of which type of computer crime? • Question 3 Agnew argues that crime is due to a lack of attachment to parents. • Question 4 _____________ is designed to impose a sanction on convicted offenders in order to prevent them from continuing to commit criminal acts in the future • Question 5 Which of the following forms of technology expanded the scope of hacker activities? • Question 6 The primary avenue of redress for corporations
Malicious damage: Examples can be Viruses, Worms or Trojans a. Internal attacks come from within the organisation by disaffected staff. Individuals or a group have authorised access and privileges to the organisations network. They may use their knowledge on the organisations network to exploit or interrupt its functions. Internal attacks can be more difficult to find as attackers have the potential to remove any evidence of the attack more easily as they have more knowledge or access rights on the system as opposed to an outside attack.
Not to mention WIRETIME is unethical in their actions. Computer hacking is considered criminalizing under The Computer Fraud and Abuse Act. Under this, BUGusa would have the right to obtain compensatory damages and court ordered relief or other just relief. Steven and WIRETIME may be sued for the executed plot performed because it is unlawful to purposely access computer information without authority to do so, under section 1030 (a)(2) – Unlawful Access to Obtain Information. If he is caught in the act, he can be charged under Uniform Trade Secrets Act.
Cyber terrorists can be motivated to target organizations that will result in the radical’s group to cause the most harm and/or receive the most attention for their party. Cyberterrorists use the internet to spread propaganda and enlist new members and use DoS/DDoS attacks to cause disruption to companies that represent actions against their belief’s (Vacca & Rudolph, 2011). Cyber terrorists can also steal information to be used for self-serving strategic purposes. Kostadinov (2012) makes the distinction between cybercrime and cyberterrorism in that the latter should resemble terrorist attacks via traditional methods but perpetrated virtually. Kostadinov goes on to note that most cyberterrorism actions are generally focused on website sabotage and email blasting.
Spyware is almost exactly as it sounds, a spying program. This type of malware will record the users input and transmit it back to the hacker to access at his leisure. This type of spyware is called a key logger and can capture interesting information such as user names, passwords, credit card numbers and email addresses. The more advanced versions of spyware can siphon off network data that will allow the hacker access to files, encryption keys, and other sensitive information. The final malware I will cover is the zombie.
Threat 13) A(n) is any weakness that makes it possible for a threat to cause harm to a computer or network. Vulnerability 14) Which type of malware is a self-contained program that replicates and sends copies of itself to other computers, generally across a network? A. Virus 15) Which group is responsible for responding to any reported cyber attack? B.
It seems to be a legal blunder that is very straight forward, but becomes a heated debate. It begins with the argument should we prosecute a gamer for stealing via the virtual world? Alex Weiss is correct in saying that prosecution for virtual theft is wrong in the scheme of things, because each player reacts differently to behaviors. Even though a person is a “raider” in a game, it doesn’t make them a criminal in the real world. Weiss opens up his article with, “As a reformed online gaming thief, this ruling makes no sense to me.
Data lost can result from many things such as hackers, power outages, or a systems crash. The security preventive steps that can be put in place are: * Standard security measures – firewalls and intrusion detection system limits the access of outsiders to the internal network. * Advanced security measures – employs machine learning and temporal reasoning algorithms for detecting abnormal access to data. * Designated DLP solutions – any attempts to copy or transfer data that is unauthorized will be detected and be prevented even if it’s intentionally or unintentionally. * Encryption & Authentication Requirements – code and encrypt all data as a mathematical algorithms or formulas to prevent unauthorized access.
This digital mask, which the writer mentions, is the biggest problem. Aleks Krotoski, also has an experts view on the subject. Dr. Karen Douglas from the University of Kent. She also agrees that the problem with cyber-bullying is the anonymity. Both of the authors agree that cyber-bullying is not as easy to stop as traditional bullying.
Ping Sweep and Port Scan Activities Abstract Ping sweeps and port scans has been a notorious and yet a useful tool for hackers and system administrators alike. This paper will examine some of the possible criminal computer activities that can be executed using these two techniques. Ping sweeps and port scans at times can be a nuisance to system administrators. While describing some of these notorious computer activities, these techniques will also be shown how system administrators can use the to benefit the company. Keywords: port scan, ping sweep Ping Sweep and Port Scans Activities With the evolution of the computer technology, system administrator obviously has had to grow with the technology.