o Unlike virus they can operate without attaching to other files and rely less

O unlike virus they can operate without attaching to

This preview shows page 2 - 4 out of 5 pages.

o Unlike virus they can operate without attaching to other files and rely less on human behaviour o They destroy data and programs as well as disrupting or even halting the operation of computer networks. Trojan Horse: a software program that appears to be benign but then does something other than expected. o The Trojan horse is not the virus because it does not replicate but is often a way for viruses or other malicious code to eb introduced into a computer system. Spyware: also acts as malicious software. Hackers and computer crime Hacker: is an individual who intends to gain unauthorized access to a computer system. Cracker: used to denote a hacker with criminal intent although in the public press, both terms are used interchangeably. Cyber vandalism: international disruption, defacement, or even destruction of a web site or corporate information system. Spoofing and sniffing: Hackers attempting to hide their identities often spoof, or misrepresent , themselves by using fake email addresses or masquerading as someone else Spoofing: involve redirecting a web link to an address different from the intended one, with the site masquerading as the intended destination Sniffer: a type of eavesdropping program that monitors information travelling over a network. Help identify potential network trouble spots or criminal activity on networks, but when used for criminal purposes, they can be damaging and very difficult to delete. Denial-of-service attacks Denial of service(DoS) attack: hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network.
Image of page 2
Distributed denial of service (DDoS): attack uses numerous computers to inundate and overwhelm the network from numerous launch points. Botnet: large number of “zombie” computers that can be used to attack a large system Computer Crime Defined by the investigative bureau of the Ontario provincial police as “ any criminal activity involving the copy of, use of, removal of, interference with, access to, manipulation of computer systems, and/or their related functions, data or programs Identity theft Is a crime in which an impostor obtains key pieces of personal information, sucha s social
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 5 pages?

  • Fall '12
  • AlecCram
  • Computer program, unauthorized access

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes