What are the offenses against confidentiality integrity and availability of computer data and systems?

Module 2 covers general categories of cybercrime, with particular attention given to “new” offences against the confidentiality, integrity and availability of computer data and systems, computer-facilitated offense, and content-related offenses, and other types of cybercrimes included within these categories.

After completing this module, you should be able to:

  • Define general types of cybercrime
  • Distinguish between categories of traditional crimes committed in non-traditional ways and “new” crimes
  • Differentiate between different forms of cybercrime
  • Explore the nature and extent of cyber incidents
  • Summarize ways in which certain cybercrimes are perpetrated

KEY TERMS/CONCEPTS




US-CERT / Cybersecurity & Infrastructure Security Agency (CISA)

Read, Review, Watch, and Listen

The purpose of this activity is to introduce students to the U.S. Computer Emergency Readiness Team and strengthen their understanding of ransomware and related attacks.

INSTRUCTIONS

Answer the following questions:

  • Thinking about the ransomware variant that you found and reviewed, describe the financial cost associated with that attack.
  • What makes ransomware particularly threatening to small and large business?
  • Why do you believe the prevalence of ransomware continues to grow? Explain.
  • Describe strategies, i.e., best practices that prevent becoming a victim of ransomware.

Key Terms/Concepts

Malicious data files are non-executable files—such as a Microsoft Word document, an Adobe PDF, a ZIP file, or an image file—that exploits weaknesses in the software program used to open it. Attackers frequently use malicious data files to install malware on a victim’s system, commonly distributing the files via email, social media, and websites.

Ransomware is a type of malware that infects computer systems, restricting users’ access to the infected systems. Ransomware variants have been observed for several years and often attempt to extort money from victims by displaying an on-screen alert. Typically, these alerts state that the user’s systems have been locked or that the user’s files have been encrypted. Users are told that unless a ransom is paid, access will not be restored. The ransom demanded from individuals varies greatly but is frequently $200–$400 dollars and must be paid in virtual currency, such as Bitcoin.

Trojan Horses are computer programs that are hiding a virus or a potentially damaging program. It is not uncommon that free software contains a Trojan horse making a user think they are using legitimate software, instead the program is performing malicious actions on your computer.

US-CERT / Cybersecurity & Infrastructure Security Agency (CISA) provides secure means for constituents and partners to report incidents, phishing attempts, malware, and vulnerabilities.

Virus and malicious code are unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. Various classifications of malicious code include viruses, worms, and Trojan horses (CISA, 2021). Viruses can damage or destroy files on a computer system and are spread by sharing an already infected removable media, opening malicious email attachments, and visiting malicious web pages.

Worms are a type of virus that self-propagates from computer to computer. Its functionality is to use all your computer’s resources, which can cause your computer to stop responding.

Refer to the course learning management system (LMS); that is Blackboard (BB), for the correct due date. In addition, submit your work via BB for grading.

Read, Review, Watch and Listen to all listed materials by the due date listed within the course LMS site.

Contact the professor with any course-related questions. Report any broken links to Dr. Ramirez-Thompson ().

Non-executable files—such as a Microsoft Word document, an Adobe PDF, a ZIP file, or an image file—that exploits weaknesses in the software program used to open it. Attackers frequently use malicious data files to install malware on a victim’s system, commonly distributing the files via email, social media, and websites.

A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files until a ransom is paid.

In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer.

A United States federal agency that provides secure means for constituents and partners to report incidents, phishing attempts, malware, and vulnerabilities.

Unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. Various classifications of malicious code include viruses, worms, and Trojan horses (CISA, 2021).

A type of virus that self-propagates from computer to computer. Its functionality is to use all your computer’s resources, which can cause your computer to stop responding.

What are the offenses against confidentiality integrity and availability of computer data and systems?

Answer:

1. Child Pornography - C (Content-related offenses​)

2. Computer-related Fraud - B (Computer-related offenses)

3. Illegal Access - A (Offenses against the confidentiality, integrity, and availability of computer data and systems)

4. Misuse of Devices - B (Computer-related offenses)

5. Cyber-squatting - C (Content-related offenses​)

6. Data interference - A (Offenses against the confidentiality, integrity, and availability of computer data and systems)

7. Computer-related Forgery - A (Offenses against the confidentiality, integrity, and availability of computer data and systems)

8. Libel - C (Content-related offenses​)

9. Illegal Interception - C (Content-related offenses​)

10. Computer-related Identity Theft - B (Computer-related offenses​)

Explanation: Here, three main types of cybercrime offenses are discussed. However, with the increase in exposure to the internet and computer-aided devices, cybercrime has diverse categories. These categories are updated now and then to make sure users are safe while using technology.

Learn more about cyber-crime:

brainly.ph/question/2362358

#BRAINLYFAST

  • What are the offenses against confidentiality integrity and availability of computer data and systems?

  • What are the offenses against confidentiality integrity and availability of computer data and systems?

    Ayaw maniwala bahalakayojan!!

  • What are the offenses against confidentiality integrity and availability of computer data and systems?

    1.C 2.B 3.A 4.A 5.A 6.A 7.B 8.C 9.A 10.B

  • What are the offenses against confidentiality integrity and availability of computer data and systems?

  • What are the offenses against confidentiality integrity and availability of computer data and systems?

    yan pong sinend ko Tama hope it's help