Untitled document (5)

.docx

School

University of Southern California *

*We aren’t endorsed by this school

Course

2252A

Subject

Information Systems

Date

May 7, 2024

Type

docx

Pages

5

Uploaded by DeaconEaglePerson198 on coursehero.com

1. Identify and discuss three examples of computer crime problems in business and society. Embezzlement- The unlawful misappropriation of money or other things of value by the person to whom it was entrusted (typically an employee) for his or her own use or purpose. Financial cybercrime- Crimes that disrupt businesses’ ability to conduct e-commerce (or electronic commerce). Online pornography- Using the Internet as a medium to violate 18 USC 2252 and 18 USC 2252A, possessing or distributing child pornography, or violating 47 USC 223, distributing pornography of any form to a minor. Phishing or spoofing The sending of email messages to members of online payment accounts, such as banks, credit-card companies, and online payment services, to update their records. In the spoofed or phished phony message, account holders are warned that failure to update the records will result in account suspension. Recipients are asked to update their email address, credit-card number and expiration date, billing address, phone number, birth date, and mother’s maiden name. The recipient is then automatically transferred to an “updating your account screen,” which resembles the screens provided by the legitimate company. If a recipient enters information, it is sent on to a criminal operation 2. Name and discuss three specific types of cybercrime and cyber problems. Cyberterrorism - Involves the use of computer networks, including the Internet, to steal, damage, and alter information. These incidents are on the rise and pose a real and present danger to the U.S. Fraud- The intentional misrepresentation of information or identity to deceive others, the unlawful use of a credit/ debit card or ATM, or the use of electronic means to transmit deceptive information in order to obtain money or other things of value. Fraud may be committed by someone inside or outside the company. Phishing or spoofing - The sending of email messages to members of online payment accounts, such as banks, credit-card companies, and online payment services, to update their records. In the spoofed or phished phony message, account holders are warned that failure to update the records will result in account suspension. Recipients are asked to update their email address, credit-card number and expiration date, billing address, phone number, birth date, and mother’s maiden name. The recipient is then automatically transferred to an “updating your account screen,” which resembles the screens provided by the legitimate company. If a recipient enters information, it is sent on to a criminal operation.
3. What is identity theft? Describe and discuss three ways identity thieves acquire victims’ information Identity theft- The criminal act of assuming another person’s identity. Internet identity theft can be much more devastating than conventional identity theft because most victims of Internet identity theft are completely unaware that anything has been stolen from them until it is much too late. You may not know it, but your computer collects all kinds of information about you and stores it in files hidden deep on your hard drive. Files like cache, browser history, and other temporary Internet files can be used to reconstruct your online habits. These files store information like logins and passwords, names, addresses, and even credit card numbers. A thief can get at this information in one of two ways, either by grabbing it when it is being sent over an unsecured transmission or by installing malicious software on your computer (like spyware), which will collect everything he or she needs and automatically send it back to him or her. The best way to protect yourself from Internet identity theft is to get an Internet security solution that is up to the challenge. 1. Mail theft- Identity thieves check mailboxes, looking not only for new mail but also for paid bills or credit-card payments that people leave in their mailboxes for the postal carrier to collect. They use information from these items to obtain credit or purchase products and services in the victim’s name. Also, by working with cooperative postal employees, they can steal mail from mail processing areas. Identity thieves can also attempt to complete a change-of-address card in order to divert a victim’s mail to a rented mailbox. 2. Phishing or spoofing involves the sending of e-mail messages to members of online payment accounts, such as banks, credit-card companies, and online payment services, to update their records. In the spoofed or phished phony message, account holders are warned that failure to update the records will result in account suspension. Recipients are asked to update their email addresses, credit-card number and expiration date, billing address, phone number, birth date, and mother’s maiden name. The recipient is then automatically transferred to an “updating your account screen,” which resembles the screens provided by the legitimate company. If a recipient enters information, it is sent on to a criminal operation, which might access the account to send spam, steal the person’s identity, make fraudulent purchases or, otherwise, falsely use another’s identity. 3. Internal access- Identity thieves can obtain personal information illegally from a computer connected to a credit reporting bureau or from an employee accessing a company’s database that contains personal identification information. 4. What is a computer virus? Describe and discuss three types of viruses.
Computer virus- A hidden fragment of computer code that propagates by inserting itself into or modifying other programs. A computer virus can be defined as a program that can “infect '' other programs by modifying them to include a copy possibly evolved of itself. Infect means that the program inserts itself into the chain of commands so that attempting to execute a legitimate program results in the execution of the virus instead or as well. 1. Trojan horses- replicate themselves and claim to do something desirable but instead do something the victim does not expect or does not want to happen. Trojans are often subdivided into two classes: password stealers and programs that do direct damage to files and file systems. 2. Memetic viruses - include virus hoaxes (sometimes called meta viruses) and other types of chain letters, erroneous security alerts, accurate but not very useful alerts, and vendor hype alerts. 3. Macro viruses- infect macro programming environments. (A macro is an automated program that helps users avoid repetitive tasks.) These spread rapidly and account for the majority of virus incidents. 5. What is cyberstalking? Discuss several ways in which it is done. Cyberstalking- The harassment of others by using a computer.The term cyberstalking generally refers to the use of the Internet, e-mail, or other electronic communication device to create a criminal level of intimidation, harassment, and fear in one or more victims. The cyber stalker is one who uses the Internet as a weapon or tool of sorts to prey upon, harass, threaten, and generate fear and trepidation in his or her victims through sophisticated stalking tactics that, for the most part, are largely misunderstood and in some cases legal. 1. Cyberstalking, like traditional offline stalking, is fueled by rage, power, control, and anger, which may have been precipitated by a victim’s actions or, in some cases, the victim’s inactions. 2. Cyberstalking behaviors can vary from a non threatening email to a potentially deadly encounter between the stalker and the targeted victim. 6. What are some ways pedophiles use the Internet? Discuss some of them. Sexual predators continue to roam cyberspace relatively undetected in an effort to lure in unsuspecting, vulnerable victims, including children and adolescents. Law enforcement agencies throughout the nation have created cybercrime units in pursuit of sexual offenders who have chosen to use the Internet as the weapon of choice. These units are not as effective and successful in apprehending offenders as one would hope. There is no denying that the number of offenders being caught in police sting operations across the nation has risen significantly, yet there are literally thousands who have gone and will continue to go undetected unless law enforcement efforts are intensified further. Many sexual predators have gone underground to form criminal subcultures that disseminate and exchange images, movies, and other pertinent personal
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help