List and discuss at least five (5) common forms of computer sabotage that are used by hackers

What will be an ideal response?


DENIAL OF SERVICE (DoS) — Hackers attack or flood a server with phony authentication methods preventing people from accessing it and ultimately shutting it down.

VIRUSES — A computer program designed to "infect" a program file that may create annoying screen messages to wipe out an entire hard drive. Like a biological virus, a computer virus infects a "host" and uses the capabilities of its host to replicate. Once executed, a virus can cause damage by erasing or altering data or files, or by simply replicating until no disk space remains and the computer seizes to function. Viruses can be transmitted from one computer to another via email.

WORMS — Are computer programs designed to automatically make copies of themselves. Unlike viruses, a worm is self-executing, largely invisible to the computer users, and spreads from computer to computer over a network without any user action.

TROJAN HORSES — A program that appears to be useful or benign but actually conceals another program that is designed to be damaging, annoying, or "humorous."

WEB / IP SPOOFS — Hackers create a false or shadow copy of a legitimate website that looks just like the real one, with all the same pages and links. All network traffic between the victims browser and the spoofed site are funneled through the hacker's machine. The hacker can acquire private information such as passwords, credit card numbers, account numbers, etc.

Criminal Justice

You might also like to view...

The highest rate of suicide in America has been found in which of the following groups?

a. Elderly men b. Teenage boys c. Middle aged women d. Teenage girls

Criminal Justice

If used when dealing with community members who may not understand it, police __________ can be a handicap to communication

Fill in the blank(s) with correct word

Criminal Justice

SELECT ALL THAT APPLY. Which of the following are delinquency pathways identified by Loeber and colleagues (1997, 1999)?

A. developmental pathway B. authority-conflict pathway C. peer-conflict pathway D. covert pathway

Criminal Justice

The majority of murder victims and offenders are men between the ages of

a. 12-17 b. 18-35 c. 36-42 d. 43 and above

Criminal Justice