| Chapter Objectives (See related pages)
- Distinguish between computer-assisted crimes and cybercrimes.
- Identify the two prerequisites for the emergence of cybercrime.
- State six advantages cybercriminals have over traditional criminals.
- Define malware.
- Differentiate between black hatters and white hatters.
- Describe the operation of botnets.
- Identify the primary purpose of a virus.
- State the purpose of DoS/DDoS attacks.
- Explain drive-bys.
- Describe the use of scareware.
- Contrast polymorphic and metamorphic viruses.
- Explain the use of ransomware.
- Describe how keylogger attacks are accomplished.
- Summarize the general rules for consent searches in the computer crime context.
- Identify the major main points for securing and evaluating a computer crime scene.
|
|