is any criminal action perpetrated primarily through the use of a computer
individuals who use computers, networks, and the internet to perpetrate crime
Internet Crime Complaint Center (IC3)
a partnership between the FBI and the National WHite Collar Crime Center
occurs when a thief steals your name, address, SSN, birth date, bank account, and credit card information and runs up debts in your name
The Federal Trade Commission
Who identified these other methods that theives could use to obtain information?
-stealing purses and wallets
posing as bank or credit card company reps
a computer program that attatches itself to another computer program and attempts to spread to other computers when files are excahnged
What is the program that the virus attatches itself to?
they are engineered to evade detection
why are computer viruses threatening?
to replicate itself and copy its code into as many other host files as possible
what is a computer virus's main purpose?
replicates itself into a hard drive's master boot record
master boot record
a program that executes whenever a computer boots up, ensuring the virus will be loaded into memory immediately
by a flash drive left in a USB port
How are most boot-sector viruses transmitted?
is a vrius that is triggered when certain logical conditions are met-such as opening a file or starting a program
a virus that is triggered by the passage of time or on a certain date
a famous time bomb that was set to trigger every year on March 6
a time bomb that spreads through email attachments
take advantage of file transport methods like emails or network connects to spread
What requires human interaction to spread?
Does a virus or a worm work more independently?
a seriees of commands that is executed without your knowledge
-used to perfor useful, legitimate functions on web sites, like collecting name and address information
a virus that attaches itself to a documet that uses macros
a short series of commands that usually automates repetitive tasks
use the address book in the victim's email system to distribute the virus
-once the infected document is opened it triggers the virus
What was the first practical example of an e-mail virus?
when they infect your computer they run a program that searches for common types of data files and compresses them using a complex encryption key that renders your files unusable.
-then you get a message that asks you to send money to an account
changes its own code or periodically rewrites itself to avoid detection
designed to infect multiple file types in an effort to fool the antivirus software that is looking for it
temporarily erase their code from the files where they reside and then hide in the active memory of the computer
-existing programs icons suddenly disappear
-if you start a browser and it take you to an unusual home page
-odd messages pop up
-data files become corrupt
-programs stop working
-your system slows down
What are some of the ways you know your computer can be infected with a virus?
is specifically designed to detect viruses and protect your computer and files from harm
a portion of the virus code that is unique to a particular computer virus
-antivirus software scans files when theyre opened or executed
-if it detects a virus signature it stops the execution of the file
-it also places the virus in a secure area on your hard drive.
the antivirus software records key attributes about files on your computer and keeps these statistics in a safe place on your hard drive
-viruses on websites
-is common and affects almost 1 in 1000 web pages
most commonly defined as anyone who unlawfully breaks into a computer system
hackers who break into systems for non-malicious reasons
the more villainous hackers
-cross between white and black
-they will often illegally break into systems merely to flaunt their expertise
data travels through the internet in small pieces called this
how are the packets identified?
packet analyzer (sniffer)
a computer program deployed by hackers that looks at each packet as it travels on the internet
a program that appears to be something useful or desirable but while it runs does something malicious in the background without your knowledge
backdoor program or rootkits
are programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge
a computer that a hacker controls in this manner
-used to launch denial-of-service attacks on other computer
denial-of-service (DoS) attack
legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer he or she has taken over as a zombie
distributed denial-of-service (DDoS) attack
which launches DoS attacks from more than one zombie at the same time
is a large group of software programs that runs autonomously on zombie computers
are virtual communications gateways or paths that allow a computer to organize requests for information
the protocol used for sending email on the internet
a software program or hardware device designed to protect computers from hackers
a firewall specifically designed for home networks
-blocking access to logical ports
-keeping your computer's network address secure
How do firewalls protect you?
firewalls filter out packets sent to specific logical ports
logical port blocking
firewals can be configured to ignore requests that originate from the internet asking for access to these ports
internet protocol address (IP address)
unique address code
network address translation (NAT)
assign internal IP addresses on a network
Virus and hacking attacks against Linux are far less likely than attacks against Windows
biometric authentication device
a device that reads a unique personal characteristic such as a fingerprint or the iris pattern in your eye and converts its pattern to a digital code
is software that has a malicious intent
What the three primary forms of malware?
is software that displays sponsored advertisements in a section of your browser window or as a pop-up ad box
is an unwanted piggyback program that usually downloads with other software you want to install from the Internet
-it runs in the background of your system
keystroke logger (keylogger)
monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information
unwanted or junk email
unsolicited instant messages and are a form of spam
can catch as much as 95% of spam by checking incoming e-mail subject headers and senders' addresses against databases of known spam
small text files that some web sites automatically store on your computer's hard drive when you visit them
What are the three major threats your data on your computer faces?
are copies of files that you can use to replace the originals if they are lost or damanged
is used to install software and usually comes on DVDs or is downloaded from the Internet
a file you have created or purched
-include files such as research papers, spreadsheets, music files, movies, etc
What would you perform in order to back up all files on your computer?
involveds backing up only files that have changed or been created since the last backup was performed
means that all system, application, and data files are backed up
What is the more efficient backup?
any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information
involves creating a scenario that sounds legitimate enough that someone will trust you
lures Internet users to reveal personal information such as credit card numbers, SSN, or other sensitive information that can lead to identity theft
when malicious code is planted on your computer that alters your browser's ability to find web addresses.
a type of malware that is downloaded onto your computer and tries to convince you that your computer is infect with a virus or other type of malware.
an attempt to make someone believe something that is untrue.
when hoaxes become so well known and they are accepted by society as true events even though they are false
is a device that protects your computer against power surges
bleed off excess current during minor surges and feed it to the ground wire
whole house surge protector
function like other surge protectors but they protect all electrical devices in the house
uninterruptible power supply (UPS)
a device that contains surge protection equipment and a large battery
-when power is interrupted, the UPS continues to send power to the attached computer from its battery