List and describe three types of attacks on computers.

What will be an ideal response?


Denial-of-service attacks: programming a computer to continuously send fake authentication messages to a targeted server, keeping it constantly busy and forcing out legitimate users; e-mail bombs: overwhelming an e-mail system with an enormous amount of mail; dictionary attacks: guessing numerous common passwords to log on to a computer system; Trojan horses: a subprogram (hidden in a program) that contains a virus, bomb, or other harmful features; password phishing: stealing password, account, or credit card information: web spoofing: creates a false (shadow) version of a website that is controlled by the attacker; worms: similar to viruses that reproduce themselves and subert computer systems; sniffers: programs used to gain passwords to access accounts; social engineering: manipulation of people to obtain critical information about a computer/network system; network scanning programs: used to find vulnerable networked computers; key loggers: secret programs that record a user’s keystrokes; steganography: hides text or information within other information or images; botnets: computer robots (computers that automatically run).

Criminal Justice

You might also like to view...

Some youths in the juvenile justice system merit classification as serious, violent, and chronic juvenile offenders, but as a group they constitute a ________ minority of the juvenile population

a. Small b. Large c. Disproportionate d. Minor

Criminal Justice

The set of individuals or other entities to which we want to be able to generalize our findings is the population.

A) TRUE B) FALSE

Criminal Justice

Name the five categories of jail offenders

What will be an ideal response?

Criminal Justice

List the three methods of crime scene recording.

What will be an ideal response?

Criminal Justice