B. Script Kiddie 4) A(n) is a software tool that captures traffic as it travels across a network. Packet sniffer 5) Which type if attacks result in legitimate users not having access to a system resource? A. DoS 6) A SYN flood attack floods a target with invalid network packets. False 7) Which type of document defines unacceptable computer behavior?
CYBERCRIME Lydda Lewis CJS/200 June 3, 2013 Lee Rankin Any kind of criminal activity that is done by using computers and the internet is called Cybercrime. This includes anything from downloading unlawful euphony files to hiding millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on the computers or collect confidential information on the internet. Possibly the most popular form of cybercrime is identity stealing, in which are use the online to steal personal information from some other users. Two of the most informal ways this is through is through phishing and pharming.
The name of Calce’s first attack was Rivolta, it was a denial-of-service attack. This type of hack is when servers become overloaded with several different types of communications, when this happens the servers will
Infecting the boot sector and potentially controlling the operating system, attaching itself to a certain program, activating when you run your program and deactivation when the program is shutdown, loading itself into the memory, or waiting for a specific date and time. A Trojan horse is malicious and will hide itself within a trusted program, simulates a legitimate program causing damage to the computer or network during program execution. Two viruses that commanded the attention of the media were Melissa and ILOVEYOU viruses. Individually striking within fourteen months of each other and exposing the weaknesses in e-mail security and the lack of software to scan these files prior to opening. To be familiar with the person sending the e-mail was not acceptable anymore and it raised awareness
The group anonymous attempted to "annihilate (the Australian governments) presence on the internet" by dosing Australian government websites, mainly the aph website. These attacks were so successful that authorities couldn’t even figure how many sites were taken down. Then Conroy just laughs it off as if he didn’t care that the aph site was down for "2
An Anon would post the MySpace of a person he didn't like and they would hack his profile, filling it with taboo pornographic images. The harassment extended to the real world, where they would leave threatening voicemails and send “black faxes” to the target's homes. One instance was reported on KTTV, a Fox affiliate in California, but the occurrences of cyber-bullying were common. Their first foray into activism was the raid on Hal Turner's (a white supremacist and Holocaust denier) radio show. After bandwidth attacks and constant prank calls to the show, Turner went off the
Another way criminals use Facbook is a way to commit cyber-crime by profile cloning. Criminals will take images from a users account as well as private information and re-create a profile. Once this is complete the hacker can request to be friends with everyone that was on the victim’s friends list. Anyone who accepts the friend request from the cloned profile is a target as well. Internet security analysts warn that Facebook is a hotbed for online crime (Sauter et al.,
The Computer Fraud and Abuse Act explicitly states “when a trespass is made with an intent to defraud that results in both furthering the fraud and the attacker obtaining something of value” (Gallegos & Senft, 2009). This definitely applies in this case, the attacker(s) used an attack known as spear fishing to dupe our customers into unintentionally installing a keystroke logging virus on to their computers. Once the virus was in place the attacker(s) waited for our customers to log into their bank accounts and recorded all the information necessary to create new user accounts and transfer funds from our customers account to other various accounts eventually ending up in the attacker(s) accounts located overseas. This would meet the qualifications stated in the Computer Fraud and Abuse Act; the attacker trespassed on these computers with the intent to obtain something of value. Also by taking the data provided by the key logger they violated the Electronics Communications Privacy.
The first law that applies to this case study is the Fraud by wire, radio, or television (Title 18 United States Code – Section 1343). This law states that whoever have intended to defraud or obtain money by means of false pretenses, representation, or promises, to be transmitted by means of wire, radio, or television. Under this law the hackers used the customer’s information to defraud the victims and steal over $290,000. The hackers knew what they were doing and installed a key logger on the computers to steal money from the customers. The second law that would apply to the case study is the Identity Theft and Assumption Deterrence Act of 1988 (Title 18 United States Code – Section 1028).
The name pretty much sums up what these threats are. In this type of unsolicited attack, a series of regular pings often used for basic troubleshooting, are generated and sent out across groups of ip addresses. I t was noted that where a normal administrator would only ping one or two intended destinations, the internet criminal would be more ambitious and perform these sweeps, looking for as many network endpoints that they can be connected to (Conklin, White , Cothren, & Williams, 2004)). One key thing to note is that DNS lookups can also be the result of ping sweeps and port scans, using the same ping utility, but taking things a step further in the infiltration process. The IP addresses ware linked to endpoint names, which gives an attacker access to information as well to produce the end points names.