Crime and Forensics – Short-Answer Questions

Topics: Computer virus, Malware, Computer worm Pages: 3 (803 words) Published: December 3, 2005
Crime and Forensics – Short-Answer Questions

What constitutes a computer crime?

This type of crime is the illegal exploitation of computer technologies, usually involving the Internet, to support crimes such as fraud, identity theft, sharing of information, and embezzlement. Exactly what is illegal varies greatly from territory to territory. Consequently, the growth of international data communications and in particular the Internet has made these crimes both more common and more difficult to police. Luckily there are people fighting computer crime and it is taken very seriously by government agencies.

What kind of software is a computer virus?

In computer security technology, a virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. A computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. Extending the analogy, the insertion of the virus into a program is termed infection, and the infected file (or executable code that is not part of a file) is called a host. Viruses are one of the several types of malware or malicious software.

What differentiates a worm from a macro virus?

Worms are programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file. Although worms generally exist inside of other files, often Word or Excel documents, there is a difference between how worms and viruses use the host file.

How does a denial of service attack work?

DoS is the short form of denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. For all known DoS attacks, there are software fixes that system administrators can...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Justice
  • Sustainability Short Answer Questions Essay
  • Essay on Short Answer Questions
  • cyber crime Essay
  • forensics Essay
  • Democracy and Objectives/short Answer Questions Essay
  • 201 Task a
  • Foodborne Illness Short Answer Questions Essay

Become a StudyMode Member

Sign Up - It's Free