CP102 Chapters 9, 10, 11, 12.docx - Chapter 9 Securing Your...

This preview shows page 1 - 3 out of 19 pages.

Chapter 9: Securing Your System- Protecting Your Digital Data and Devices - Cybercrime: any criminal action perpetrated primarily through these of a computer - Cybercriminals: individuals who use computers, networks, and Internet to perpetrate crime - The internet crime complaint center (IC3): partnership between FBI and national white collar crime center Types of things reported: FBI-Related Scams, Identity theft, nonauction/non- delivery of merchandise, identity theft, advance free fraud (convincing individuals to send money as a “good faith” gesture to enable them to receive larger payments in return - Theft of personal data is of most concern Identity theft occurs when a thief steals personal information such as your name, address, social security number, birth date, bank account number, credit card information, runs up debts in your name Computer Viruses - Computer virus: computer program that attaches itself to another computer program (host program) and attempts to spread to other computers when filed are exchanged Creating and dissemination computer viruses is one of the most widespread types of cybercrimes Engineered to evade detection A computer viruses main purpose is to replicate itself and copy its code into as many other host files as possible If computer is exposed to a file infected with a virus, the virus will try to copy itself and infect a file on your computer - Boot sector virus: replicates itself onto a hard drive’s master boot record Transmitted using a flash drive left in a USB port - Master boot record: program that executes whenever a computer boots up, ensuring that the virus will be loaded into memory immediately, even before some virus protection programs can load - Logic bomb: virus that is triggered when certain logical conditions are met, such as opening a file or starting a program a certain number or times - Time bomb: virus that is triggered by the passage of time or on a certain date - Worm: worms take advantage of file transport methods, such as e-mail or network connections, to spread on their own Works independently of host file execution and is much more active in spreading itself - Script: series of commands, a miniprogram that is executed without your knowledge - Macro virus: virus that attaches itself to a document that uses macros Short series of commands that usually automates repetitive tasks - Email virus: use the address book in the victim’s email system to distribute the virus
Image of page 1

Subscribe to view the full document.

- Encryption virus (ransomeware): infect your computer, they run a program that searches for common types of data files, and compresses them using a complex encryption key that renders your files unusable Flaw: law enforcement officials can trace payments to an account and may possibly be able to catch the perpetrators - Polymorphic virus: changes its own code of periodically rewrites itself to avoid detection - Multipartite virus: designed to infect multiple file types in an effort to fool the antivirus software that is looking for it - Antivirus software:
Image of page 2
Image of page 3
  • Fall '19

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask 0 bonus questions You can ask 0 questions (0 expire soon) You can ask 0 questions (will expire )
Answers in as fast as 15 minutes