CIS 170 Midterm Exam Solution https://hwguiders.com/downloads/cis-170-midterm-exam-solution CIS 170 Midterm Exam Solution • Question 1 Data alteration and denial directly targets the computer by attacking the useful information stored or processed by the computer. • Question 2 Child pornography is an example of which type of computer crime? • Question 3 Agnew argues that crime is due to a lack of attachment to parents. • Question 4 _____________ is designed to impose a sanction on convicted offenders in order to prevent them from continuing to commit criminal acts in the future • Question 5 Which of the following forms of technology expanded the scope of hacker activities? • Question 6 The primary avenue of redress for corporations
Kostadinov goes on to note that most cyberterrorism actions are generally focused on website sabotage and email blasting. In order to prove that the network breach was a terrorist attack the company would need to provide electronic evidence of these types of information warfare. Information warfare is a term often used interchangeably with cyberterrorism but provides a deeper understanding in the shift of how data has become fundamental to society. As governments, companies and people shift to the use of digital information so have the methods used to attack (Gilmer, 2001). In order to combat this aspect of terrorism, the military have adopted computer forensics as part of their defenses (Vacca & Rudolph, 2011).
Criminals are turning to cyber-crime because of the speed and convenience. Cyber-crimes include attacks against computer data and systems, identity theft, Internet fraud, e-mail scams, and phishing. In addition the threat of terrorism forces authorities to address security vulnerabilities related to information technology infrastructure such as power plants, electric grids, information systems, and the computer systems of government and major companies. References Cantor, M. (2013). Pentagon on cyber security force: Quintuple it.
It would be considered robbery because Sarah takes the laptop computer by using force and/or fear. Since Sarah used a deadly weapon for the purpose of force or fear makes this an aggravated robbery. This is a violent crime, whereas the other two situations are classified as property crimes. (Miller & Jentz) The third and last situation where Sarah passes by Makoto’s house one night, sees the computer on the desk from the window, breaks the lock, enters into the house and then leaves with the computer falls under Burglary. This situation would be considered burglary because it consists of many factors that define burglary such as breaking and entering a building with intent of committing a felony; in this case the felony was stealing the laptop.
Spyware is almost exactly as it sounds, a spying program. This type of malware will record the users input and transmit it back to the hacker to access at his leisure. This type of spyware is called a key logger and can capture interesting information such as user names, passwords, credit card numbers and email addresses. The more advanced versions of spyware can siphon off network data that will allow the hacker access to files, encryption keys, and other sensitive information. The final malware I will cover is the zombie.
D) A denial of service attack occurs when the perpetrator e-mails the same message to everyone on one or more Usenet newsgroups LISTSERV lists. A) A denial of service attack occurs when the perpetrator sends hundreds of messages from randomly generated false addresses, overloading an Internet service provider's e-mail server. 8) Gaining control of someone else's computer to carry out illicit activities without the owner's knowledge is known as A) hacking. B) hijacking. C)
They break into our computer for several reasons but mainly to acquire personal information for financial gain, shut down hardware, steal people’s credit information, and destroy data. To protect ourselves from hackers, we should equip our computer with Firewall. This hardware “prevents unauthorized Internet users from accessing private information” (Williams & Sawyer, 2013, p. 361). Identity theft is a serious crime in which thieves steal your name and identity and use to later to make a purchase under your name. Thieves access your personal information by sending out fake e-mail, mining the trash, and stealing your
The Computer Fraud and Abuse Act explicitly states “when a trespass is made with an intent to defraud that results in both furthering the fraud and the attacker obtaining something of value” (Gallegos & Senft, 2009). This definitely applies in this case, the attacker(s) used an attack known as spear fishing to dupe our customers into unintentionally installing a keystroke logging virus on to their computers. Once the virus was in place the attacker(s) waited for our customers to log into their bank accounts and recorded all the information necessary to create new user accounts and transfer funds from our customers account to other various accounts eventually ending up in the attacker(s) accounts located overseas. This would meet the qualifications stated in the Computer Fraud and Abuse Act; the attacker trespassed on these computers with the intent to obtain something of value. Also by taking the data provided by the key logger they violated the Electronics Communications Privacy.
3. If an extremely intelligent hacker is caught by a law enforcement agency, should that hacker be prosecuted and sent to jail? Is there perhaps a way that hacker might be “turned” for the good of the digital world? What would that be? • It is depends on what kind of fraud had been done by the hacker.
The FBI deals with any kind of threat from white collar fraud in health care, financial to the most violent of crimes and even public corruption. The criminal organizations that have formed in the US represent a significant threat to our safety as these