CRIM 380 Study Guide - Midterm Guide: Homograph, Indictable Offence, Script Kiddie

169 views21 pages

Document Summary

Advanced persistent threat: group/foreign government, persistent, over long ime, target speciic. Malware writen for stealth: responsible for 80% of cybercrime. Credit card: method, hacker in crime unit enters target, goes unil skills allow, pass to next person with specialty/experise, repeat, top hacker steals wanted into and covers track, organizaion. Group disband or reform ater crime for next one. Organized cybercrime business: to meet goals, create library of sotware and diy malware, need: Malware distribuion: zeus ater it was leaked, it was modiied by various groups, creaing new botnets and variants, and botnet kits = started innovaion race, koobface infrastructure. Monitor links to ensure not lagged as malicious. Maintain banlist of ip addresses forbidden from accessing servers: specializaions. Botnets: want something simple so he can have a central system to control all of them at once: Defraud people: command and control computer is vulnerable. Law enforcement can allow computer to be infected with botnet on purpose: honeypot computer.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents