• Question 15 Traditional money laundering techniques include all of the following except one. Which technique below is not a traditional method of money laundering? • Question 16 Opportunities for identity crimes have increased primarily because consumers are increasingly asked to use their social security number as a personal identifier. • Question 17 A subculture is a set of values, norms, and beliefs that differ from the dominant culture. • Question 18 The unique feature of a worm is that it: • Question 19 A virus is a piece of code that attaches itself to other instructions within a computer.
Internal attacks can be more difficult to find as attackers have the potential to remove any evidence of the attack more easily as they have more knowledge or access rights on the system as opposed to an outside attack. Attacks can be administrated via removable devices such as a USB that could contain some form of malware on it such as a virus. Most internal attacks are conducted by unhappy employees who want to disrupt the organisation by using the knowledge they obtained in the organisation, against the organisation. Additionally, the employee may want to gain access to important data in order to infiltrate and sell the information onto another competing organisation. The
Cyber terrorists can be motivated to target organizations that will result in the radical’s group to cause the most harm and/or receive the most attention for their party. Cyberterrorists use the internet to spread propaganda and enlist new members and use DoS/DDoS attacks to cause disruption to companies that represent actions against their belief’s (Vacca & Rudolph, 2011). Cyber terrorists can also steal information to be used for self-serving strategic purposes. Kostadinov (2012) makes the distinction between cybercrime and cyberterrorism in that the latter should resemble terrorist attacks via traditional methods but perpetrated virtually. Kostadinov goes on to note that most cyberterrorism actions are generally focused on website sabotage and email blasting.
Lately, there have been many news stories about young adults who have committed suicide due to cyberbullying. In today’s society, the internet has become very common and it plays a major role in teenagers’ lives. They can shop, express their thoughts, and even make new friends online. It is also important to note how easy it is to distribute information across the internet in very little time. While there are positive outcomes of the internet, there still exist dangerous aspects to it, such as bullying.
Viruses and Worms Operating system security is at the core of a safe, secure operating system. Our computers are vulnerable to corrupt files, compromised data, and system crashes. There are many attack methods used to uncover your personal information. Two of the methods are viruses and worms. A virus is an executable code usually sent in an e-mail attachment or hidden in audio clip, video clip, or game.
Spyware is almost exactly as it sounds, a spying program. This type of malware will record the users input and transmit it back to the hacker to access at his leisure. This type of spyware is called a key logger and can capture interesting information such as user names, passwords, credit card numbers and email addresses. The more advanced versions of spyware can siphon off network data that will allow the hacker access to files, encryption keys, and other sensitive information. The final malware I will cover is the zombie.
It seems as if cyber-bullying is a cruel way to treat someone. Any identity can be created on the Internet and that could be a good thing or a bad thing. Many things happen on the web and people hurt certain ones and do not get the punishment they should. Cyber-bullying has led to murders including suicides. The Internet is a huge tool when it comes to the subject taunting others.
Tevin Hutchinson 11/10/2012 English 102 Technology plays a huge role in our everyday life. I do believe that technology has made our lives easier, but it also has made us more dependent on the technology itself. When using the internet for a dictionary you could easily get distracted. Anyone can put anything on the internet, so what you find might not be accurate. Most people find that looking things up on the internet is distracting because you are already on the web so why not check YouTube for a funny video, or update your status on the social network.
Today, the meaning of communication has completely changed. It has become much easier to sustain a relationship through social media and the constant interaction that it provides. In contrast, social media can also prove to destroy relationships. Some people may get so caught up in virtual relationships that they have little to no regard for actual relationships. They may become so used to communicating via internet that they lose basic communication skills and can’t hold a face to face conversation.
In social networks people make “friends” without knowing the person and make personal information easily available” (Sauter, Poltrack, & Allen, 2012, para. 2). Criminals using social media use tools that will go through a dictionary on the Internet searching for common passwords. Facbook users can be victims of this type of hacking because many of the passwords used are common. Another way criminals use Facbook is a way to commit cyber-crime by profile cloning.