• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back
Cyber activities
Cyber exploitation: most common but Least severe. Ex. cyber stalking, Piracy.

Disruptive Cyber Activities: less common more severe


Destructive Cyber Activities: most severe least common



Runions cyber-aggression model

-A model that ranges from Impulsive to controlled & appetitive, Aversive

- has categories Impulsive appetitive, Impulsive-Reactive aggression, Controlled-Appetitive aggression, and Controlled-reactive Aggression

Impulsive Reactive Aggression

-Impulsive-reactive aggression maps most closely to the long-recognized frustration-aggression model


- Involves attribution of intent to other social actors


- On sites such as Facebook and Twitter, there are no semantic cues or social cues (face o face interactions) to tell them that the text messages are not intended to be provocative or offensive


- Impulsive-reactive aggression also involves failure of self-control can be due to lack of sleep, going through adolescence

Impulsive-appetitiveAggression

- Engage in impulsive, risky thrill-seeking behavior, aimed at immediate gratification or self-reward (consistent with low-self control)


- Social networking sties provide a constant audience of peers from which they can seek affirmation (consistent with differential association theory)

Controlled-ReactiveAggression

- Vengeful aggression, involves a higher degree of self -control


- Have a sufficient self-control to avoid immediate impulsive reactions to perceived in provocations


- Will delay reaction until opportunity presents itself (Take some time to craft the response)


- Go through a "hostile rumination process" (re-visiting the act and thinking about it)

Controlledappetitive aggression

- Motivated by desire for "material or social rewards (consistent with SLT)


- May experience "positive affect" from harassing, intimating or belittling others


- Do not engage in cyberbullying because of perceived provocation, but rather, because of anticipated reward


- Higher level of planning, self-control (self-efficacy) and limited empathy for the victim


- May believe that cyber aggression may be completely normal

Negative Affect

- Negative affect is the key factor (or intervening condition) that links strain to delinquency


- Negative affect includes a variety of negative emotions such as anger, frustration, guilt depression worthlessness and anxiety


- While negative affect may cause some individuals to withdraw or become suicidal , it has its greatest influence on delinquency and criminal behavior when it results in anger, and individuals blaming others for the adversity they are facing

Aggravated and Experimental Sexting

- Aggravated


*Adult solicitation


* Threats or extortion


* Circulating photos without consent


-Experimental


* Relatively harmless incidents


* Sexting between consenting minors

TheHeuristic-Systemic Model

- Also known as the HSM Model


- Originated from persuasion research in social psychology


- People establish validity of received messages using a mixture of heuristic processing and systemic processing


- Known as a “dual process model” because it incorporates two information processing modes

HeuristicProcessing

- Done quickly to make a validity assessment


- Looks of heuristic cues surrounding or embedded within message


- Heuristic cues could include length, format, source, and subject

Systematicprocessing

- Takes more time and effort than heuristic processing


- Undertaken when heuristic processing doesn’t meet the sufficiency threshold


- Considers perceived importance, perceived risk, time and skill level required

The Low Down Under

1.Compromise the bank customers user credentials (through phishing)


2. "executive" transfers money from bank customers account to a third party account (In name of an internet "mule"


3. Internet mule holds money in his/her account in the country where the fraud is committed


4. Executive contacts the mule once the money has been deposited into the mules account


5. Mule draws money out in cash and transfers it overseas to executive overseas


6. Money picked up overseas in cash, by local money mule who funnel proceeds to executives

Vishingand Pharming

Vishing - Also known as voice phisihing Occurs via text or voice messages sent on cell phones E.g., offender poses as bank rep, and tells victim his/her account has been compromised Victim is then directed to call another number, where he/she receives recorded instructions to enter account number and password


Pharming - Also known as page hijacking Offender creates website that looks identical to authentic websites However, mirror website carries malicious payload (e.g. Trojans or other spyware) Victim is also prompted to enter username and passwords

What motivates hackers

1. The "hacker work ethic" where hackers are motivated less by money and more by the playfulness of the activity and the reward of accomplishing their objective


2. The "Money Ethic" Where hackers are motivated by making enough money to Gain independence in order to be free to pursue the hackers work ethic without having to worry about money


3. The "nethic" where hackers adopt new (internet) social norms, like the right "freedom of expression" and the right to personal privacy

Vulnerability life style

- Stage 1 - Initial discovery of new vulnerabilities by strategically orientated (FGOs, Poetical movements, Organized crime etc..)


- Stage 2- strategically-orientated entities fund their future exploits by marketing their discoveries or "innovations"; financially-orientated entities purchase the newly developed vulnerabilities early in the life cycle before they are widely known


- Stage 3 once these vulnerabilities became known they are used by script kiddies and others to gain social standing

4 Categories of Computer Crimes

- Circumventing of Code based restrictions (e.g. hacking, password cracking, password sharing, etc., Ranging from all 3 stages of the vulnerabilities lifecycle, from innovators to script kiddies)


- Existing crimes made easier or having a greater impact(e.g. Criminal harassment, wire transfer)


- Existing offensive (but not criminal) Activates Rising to the criminal level in the electronic or virtual context (Adverting on a scale that renders the computer or system ineffective)


-Computer Specific crime

Two kinds of Cyber Attacks

Targeting Data and Targeting control systems

Spear Phishing

- Specifically targeting a particular individual or corporations (often a "big fish")


- The spear phisher generally knows the individual's name, email address, and enough about his or her context to sound plausible


-Personal information used in spear phishing is often obtained through information that is put up online by you

Instrumental Anger

Instrumental aggression is thought to be planned behavior aimed at the utilization of aggression to achieve an end goal, and isoften described as cold-blooded, implying a dominance of reasoned cognition over affect-driven processing

The Hacker-Trickster Connection: Core Motifs
1 The motif of duplicity (propensity for lying and deceit);

2 The motif of boundary crossing (propensity for long-distance traveland connection making);


3 The motif of subversion of power (propensity for pranks anddeconstruction of power hierarchies);


4 The motif of creativity and craftsmanship (propensity for findingcreative solutions and making original discoveries).

Definition of Hacker

The Merriam-Webster Dictionary has two contradictoryentries for “a hacker”: “a person who is inexperienced orunskilled at a particular activity” and “an expert at programming andsolving problems with a computer.”