Chapter 10 Lecture Notes

Promote political or ideological goals 6 types of

This preview shows page 2 - 4 out of 5 pages.

promote political or ideological goals 6. Types of Criminals a. No clear profile as to who commits computer crimes b. Four groups of computer criminals b.i. Current or former employees b.ii. People with technical knowledge committing crimes for personal gain b.iii. Career criminals using computers to assist them in crimes b.iv. Outside crackers hoping to find information of value 7. Information modification a. User access electronic information b. User changes information b.i. Employee gives herself a raise 8. Computer Viruses and Other Destructive Code a. Malware – short for “malicious software” such as viruses, worms, and Trojan horses b. Virus – destructive program that disrupts the normal functioning of computer software c. Worm – variation of a virus that is targeted at networks, taking advantage of security holes d. Trojan horse – does not replicate but causes damage; codes are hidden e. Logic bombs or time bombs e.i. Variations of Trojan horses e.ii. Time bombs are set off by specific dates; logic bombs are set off by certain types of operations 9. Denial of Service Attack a. Attackers prevent legitimate users from accessing services b. Zombie computers b.i. Created by viruses or worms b.ii. Attack websites c. Servers crash under increased load 10. Spyware a. Hidden within freeware, or shareware, or embedded within websites b. Gathers information about a user b.i. Credit card information b.ii. Behavior tracking for marketing purposes c. Eats up computer’s memory and network bandwidth d. Adware d.i. Free software paid by advertisements d.ii. Sometimes contains spyware d.iii. Collects information for banner ad customization 11. Spam a. Electronic junk mail b. Advertisements of products and services
Image of page 2

Subscribe to view the full document.

c. Eats up storage space d. Compromises network bandwidth e. 90% of all internet email is spam! f. Spam filters can help g. Spim – spam in text message form
Image of page 3
Image of page 4

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern