CC 201-001 Week 3 Class 5
CC 201-001 Week 3 Class 5 CC 201-001
Popular in Introduction to Cyber Criminology
Popular in Cyber Criminology
This 2 page Class Notes was uploaded by Jennifer Gintovt on Thursday September 22, 2016. The Class Notes belongs to CC 201-001 at University of Alabama - Tuscaloosa taught by Adam Ghazi-Tehrani in Fall 2016. Since its upload, it has received 14 views. For similar materials see Introduction to Cyber Criminology in Cyber Criminology at University of Alabama - Tuscaloosa.
Reviews for CC 201-001 Week 3 Class 5
Report this Material
What is Karma?
Karma is the currency of StudySoup.
Date Created: 09/22/16
Old crimes on a new medium Virtual bank robbery: • Online robberies can take a few forms o Most common are identity theft and billing system exploits “Identity theft” • Term used incorrectly as a catchall term to explain fraud due to impersonation o In most cases hackers will steal bank logins and passwords in order to remove funds § Known as input fraud § Criminals are not attempting to steal the entire identity but rather to pretend to be the victim temporarily to steal funds Four Main Methods 1. Trashing • Sorting through a targets trash (dumpster diving) • Document shredders make trashing difficult • Cons: both labor intensive and local 2. Phishing • Typically will consist of millions of emails being sent • Most rely on a recipient’s inability to distinguish it from a trustworthy email • Two newer forms include: o Vishing § Use of Voice Over Internet Protocol (VoIP) to send recorded messages to voicemails instead of email o SMiShing (SMS stands for short message service) § Bulk text messages instead of emails 3. Pharming • Also known as DNS cache poisoning and DNS spoofing • DNS Spoof o Attack on the computers that translate, for example, www.google.com into the IP address where Google’s servers reside o Attacker can pretend to be a DNS and redirect a user’s request for google to any IP address they choose o Usually means a fake site designed to look like the site the user is attempting to reach 4. Spyware • Designed to steal all types of user infor mation o Sometimes enough to steal identity 2