Chapter 3 key terms PDF

Title Chapter 3 key terms
Author brooke heron
Course Computer Crime and Forensic Science
Institution Trent University
Pages 2
File Size 78.4 KB
File Type PDF
Total Downloads 73
Total Views 180

Summary

key terms from chapter 3 of the textbook...


Description

CHAPTER 3 KEY TERMS

TRADITIONAL COMPUTER CRIME: EARLY HACKERS AND THEFT OF COMPONENTS Anonymizer Black Market Dealers

Crackers

Cybercriminal Organizations

Cyberpunks

Data Piracy Grey Market Dealers Hackers Hackivists Informational Voyeurs

Insiders Legion of Doom

A proxy server that makes internet activity untraceable; protects personally identifying information by hiding private information on the user’s behalf The most organized groups trafficking in stolen computer components; solicit orders and prepare merchandise as requested; targets are selected only after they receive an order for particular merchandise; they actively participate in the theft itself Sophisticated users who employ their knowledge for personal gain (criminal hackers); those who target data which is valuable on its face (e.g., trade secrets and proprietary data) or directed at data (e.g., credit card data) which may be used to further other criminal activity Groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime; their motivations are never innocuous and include those activities associated with political extremism or economic gain; sophistication of methods/technical expertise range from elementary to highly complex; does not include traditional crime syndicates Innocuous term which has been hotly contested by First Amendment advocates but has been used by law enforcement officials to refer to individuals’ intent on wreaking havoc via the internet (vandalism, destructive programs, and general mischief for no economic gain) The reproduction, distribution, and use of software without the permission or authorization of the owner of copyright Often legitimate businesses with questionable/illegal practices; reselling – fraudulent sale/counterfeit goods Individuals who identify and exploit system vulnerabilities but who lack economic motivation Fastest growing category of hackers; added data breeches Category of hackers; individuals whose motivations range from inquisitiveness to bravado to sensationalism; closely related to pure hackers or technological thrill seekers Current and former employees; pose the most overlooked danger to informational security Hacking group; members often promoted themselves, boasting of their exploits on a variety of online bulletin boards; most members were not malicious or criminal minded; many would point out security flaws in institutional systems so that repairs would be made,, others eventually sought employment at the institutions they had victimized

Phreaking Script Kiddies

Shareware

Software Piracy Vicinage WareZ

Involves the manipulation of telecommunications carriers to gain knowledge of telecommunications, and/or theft of applicable services “skidots”, “skiddie”, or “Victor Skill Deficiency (VSD)”; the lowest life form of cybercriminal; this is a derogatory term used by more sophisticated computer users to refer to inexperienced hackers who employ scripts or other programs authored by others to exploit security vulnerabilities or otherwise compromise computer systems Commercial programs/software; Relies on people’s honesty; encourages people to give copies of programs to friends and colleagues but asks everyone who uses a program regularly to pay a registration fee Licenced users of programs sharing with unlicensed individuals Location of the physical act Extremely popular on the Internet; enable visitors to download software illegally in violation of copyright protections; many of these sites are created and maintained by highly sophisticated, well-educated administrators...


Similar Free PDFs