CRIM 380- Final Exam Guide - Comprehensive Notes for the exam ( 72 pages long!)

305 views72 pages

Document Summary

Old definition: law abiding, create tools to benefit: did not have motives. Largest sub-pop: usually referred to as (cid:858)s(cid:272)ript kiddies(cid:859, use downloaded hacker tools. Disorganized groups some hacks are done by volunteers who form groups based on motivation about certain topic (ex: anonymous loosely formed attack: quickly in & out. Cyber punks capable of writing small programs themselves: (cid:373)ai(cid:374)ly (cid:862)defa(cid:272)i(cid:374)g(cid:863) we(cid:271) pages, spa(cid:373)(cid:373)i(cid:374)g, or (cid:272)redit (cid:272)ard theft. (cid:373)a(cid:374)y go(cid:448)er(cid:374)(cid:373)e(cid:374)t age(cid:374)ts (cid:449)o(cid:374)(cid:859)t take the ti(cid:373)e to differe(cid:374)tiate (cid:271)et(cid:449)ee(cid:374) a (cid:272)urious ha(cid:272)ker (cid:449)ho (cid:449)a(cid:374)ts to test his skills on an advanced security system and a spy. Four stages of a social engineering attack . Is the exploitation of a bug (flaw) that allows the program to process invalid data: ca(cid:374) (cid:271)e used (cid:271)y a(cid:374) atta(cid:272)ker to i(cid:374)trodu(cid:272)e (cid:894)or (cid:862)i(cid:374)je(cid:272)t(cid:863)(cid:895) (cid:272)ode i(cid:374)to a (cid:272)o(cid:373)puter progra(cid:373) to (cid:272)ha(cid:374)ge course of execution. Self-(cid:272)o(cid:374)trol theory of (cid:272)ri(cid:373)e, aka (cid:862)ge(cid:374)eral theory of (cid:272)ri(cid:373)e(cid:863)

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents

Related Questions