Question

In: Computer Science

What is the Bank Secrecy Act of 1970? How has the advent of computer technologies created ways around this Act? What is phishing?

What is the Bank Secrecy Act of 1970? How has the advent of computer technologies created ways around this Act? What is phishing?

How does phishing fit into the prob-lem of identity theft?

What is the difference between a virus and other types of malicious code?

What are the most common types of viruses?

What are the various types of exploitation that can occur over the Internet?

What are the characteristics of the typical victims of Internet exploitation crimes?


Solutions

Expert Solution

What is the Bank Secrecy Act of 1970? How has the advent of computer technologies created ways around this Act? What is phishing?
Answer:-------------
The Bank Secrecy Act (BSA),
also known as the Currency and Foreign Transactions Reporting Act, is legislation passed by the United States Congress in 1970 that requires U.S. financial institutions to collaborate with the U.S. government in cases of suspected money laundering and fraud. The purpose of the BSA, aside from making money laundering more difficult to propagate, is to prevent banks from becoming unknowing intermediaries in illicit activity.

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

How does phishing fit into the prob-lem of identity theft?
Answer:-------------
Tricking consumers into disclosing their personal and financial data, such as secret access data or credit card or bank account numbers, is identity theft. Such schemes perpetrated through the Internet are called “phishing” for information.

What is the difference between a virus and other types of malicious code?
Answer:-------------
Malware
is a catch-all term for any type of malicious software, regardless of how it works, its intent, or how it’s distributed. A virus is a specific type of malware that self-replicates by inserting its code into other programs. Computer viruses have been prominent since almost the beginning of the commercial internet: The first one was created in 1982 for the Apple II, and other versions quickly followed.

Viruses spread by attaching themselves to legitimate files and programs, and are distributed through infected websites, flash drives, and emails. A victim activates a virus by opening the infected application or file. Once activated, a virus may delete or encrypt files, modify applications, or disable system functions.

What are the most common types of viruses?
Answer:-------------
Some of the most common viruses are:------------

  • Boot Sector Virus.
  • Direct Action Virus.
  • Resident Virus.
  • Multipartite Virus.
  • Polymorphic Virus.
  • Overwrite Virus.
  • Spacefiller Virus.

What are the various types of exploitation that can occur over the Internet?
Answer:-------------
Using the internet for the production, manufacture, and distribution of child or other sexually deviant pornography. Using the internet to expose youth to child pornography and encouraging them to exchange pornography. Using the internet to entice and exploit women and children for the purpose of sexual tourism (travel with the intent to engage in sexual behavior) for commercial gain and/or personal gratification.

What are the characteristics of the typical victims of Internet exploitation crimes?
Answer:-------------
The primary targets for these types of crimes are almost always women and children. Girls are on average targeted almost twice as much as boys (70 percent vs 30 percent). More than 3/4 of targeted youth are 14 and older. Almost all (86 percent) incidents were with people the the youth originally met online. Most victimization for normal crime occurs when the victim and offender have some type of prior relationship, but stranger to stranger online interactions occur more often in regards to cyber-crime.


Related Solutions

In what ways has the advent of a converged network changed the way networks are designed...
In what ways has the advent of a converged network changed the way networks are designed and configured?
2-Explain the development of the FDIC, under what act was is created and why? Discuss how...
2-Explain the development of the FDIC, under what act was is created and why? Discuss how an individual might maximize their FDIC coverage. What changes did the FDIC implement after the recent financial crisis?
Discuss how emerging technologies, such as the Internet, affect the GL/ BR process. In what ways...
Discuss how emerging technologies, such as the Internet, affect the GL/ BR process. In what ways will organizations have to adapt their business processes to reflect the changes in these external factors?
How does the USA PATRIOT Act of 2001 pertain to computer forensics? What aspects of the...
How does the USA PATRIOT Act of 2001 pertain to computer forensics? What aspects of the field are covered in the act? In what ways is the act beneficial? What does the act not address with regard to computer forensics? What loopholes do you see? What parts of the act do you believe are unnecessary or overreaching concerning digital evidence?
In what ways has the Family Medical Leave Act not affected the stresses of informal caregiving?
In what ways has the Family Medical Leave Act not affected the stresses of informal caregiving?
1. In what ways are the bank of japan and the bank of England similar to...
1. In what ways are the bank of japan and the bank of England similar to the federal reserve? 2 .In what ways are the bank of Japan and the Bank of England significantly different from the federal reserve? 3.Critics of the Bank of Japan argue that it played a role in the global financial crisis. What do these critics argue A. The bank of Japan raised interest rates too quickly as the crisis was beginning. B. The bank of...
GAAT, WTO, IMF, WORLD BANK. In what ways are they similar? In what ways are they...
GAAT, WTO, IMF, WORLD BANK. In what ways are they similar? In what ways are they different?                                                                                                                             
Assume that a mad scientist has created a computer that has 9 bit registers. The most...
Assume that a mad scientist has created a computer that has 9 bit registers. The most significant bit is the sign bit. He wants to execute the following operation using 9 bit register. -256-2 Use 2's complement method (in binary) to find the result of the above operation in binary system. Show the computations in the answer.
The research around Leona’s Tacos has created quite a buzz and business is great. Leona is...
The research around Leona’s Tacos has created quite a buzz and business is great. Leona is planning on expanding her menu and she’s going to start with a new taco filling. She is considering her own black bean mix “Savor” and Hadey’s famous braise of seitan “Praise”. She naturally performs a blind taste test with 20 randomly selected judges from Avocado Park. Each judge is randomly served a taco filled with either “Savor” or “Praise” and asked to assess the...
The research around Leona’s Tacos has created quite a buzz and business is great. Leona is...
The research around Leona’s Tacos has created quite a buzz and business is great. Leona is planning on expanding her menu and she’s going to start with a new taco filling. She is considering her own black bean mix “Savor” and Hadey’s famous braise of seitan “Praise”. She naturally performs a blind taste test with randomly selected judges from Avocado Park. Each judge is served a taco filled with either “Savor” or “Praise” and asked to assess the experience using...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT