In: Computer Science
ENG 410 Professional & Ethical Practice Assignment 2
Computers make crimes easier to commit more devastating harder to detect doable from long distances.
1. Describe each type of networked computers and smartphones attacks.
2. Describe each type of computer crime perpetrators and what are their objectives. 3. Describe computer and internet crime effects on society.
4. Describe the laws against hacking and what federal laws that apply to computer attacks.
5. Describe the cost-benefit analysis table technique and give an example.
Below are the different type of Networked Computer Attacks:
Malware: Type of malicious application, which is used to damage the network also to gain access to the network.
Virus: It was type of malware which needs a human interaction to infect and exploit the network. The classic example of this kind of attacks were the attachment that comes along with the spam email.
Worm: It is a kind of malware which can exploit a device without human interaction. Example, user may be running a vulnerable network applicationm through which a attacker can send malware.
Botnet: Set of privately connected computers are completely exploited through malware, and controlled without the owner's knowledge.
Packet Sniffer: An non intend receiver receiving the packets that are flowing through a network is called packet sniffing.
Smart Phones Attack:
1. Data Leakage: Basically the "risk wares" cause this issue, with many unsecured apps that are downloaded to our smartphone, we will just give all permission without much care to it.
2. Network Spoofing: It was a kind fake access points, actually it was a trap. Once we enter the access point's network automatically the intruder will get full access to our device.
3. unsecured WiFi: The free wifi is always a trap to access your confidential data, it will automatically take control of your device, without your knowledge.
Type of computer crime perpetrators:
Fraud : Usually this kind of people of objective is to do digital financial crimes, they will try get your confidential information to loot your digital economy.
Hackers: Here the objective of this intruders is to gain access of your systems and networks and they will take full control and they will demand a Ransom to free the network back to its original state.
Attackers : The motive is simply to collapse the attacked infrastructure, mostly the competitive organization running this attack against the fellow organization in the market.
How internet crime affecting society:
All this nasty attacks are disturbing the society in so many ways. Consider when a digital crime happens, it will massively attack the economy of particular community that depending the compromised financial organization's network. When a government sectors infra got attacked it will suffer all the stake holders involved in the process, even it will take month's to recover.
Out of this all the worst part of this attack was peeking to someone's personals, which is more complicated to deal with.
Laws against Cyber crime:
The federal computer fraude and Abuse Act(CFAA) was found by US goverment to fight against this nasty business.
It covers the following crime.
1. Unauthorized access to a individual or to a organizations systems.
2. With fraud intent to get into someone's system to loot confidential data.
3. intentionally access someones device to do financial crimes.
4. Peeking into someone's personal files by hacking.
Consequences :
The reaction from the bureau against this crimes are based on the damage the attack is causing. It start from few million dollars fine to even Death penalty, based on the effect of the crime to the society or to a individual human.