- Term Papers, Book Reports, Research Papers and College Essays

Crime and Forensics - Short-Answer Questions

Essay by   •  November 21, 2010  •  Study Guide  •  763 Words (4 Pages)  •  1,910 Views

Essay Preview: Crime and Forensics - Short-Answer Questions

Report this essay
Page 1 of 4

Crime and Forensics - Short-Answer Questions

What constitutes a computer crime?

This type of crime is the illegal exploitation of computer technologies, usually involving the Internet, to support crimes such as fraud, identity theft, sharing of information, and embezzlement.

Exactly what is illegal varies greatly from territory to territory. Consequently, the growth of international data communications and in particular the Internet has made these crimes both more common and more difficult to police. Luckily there are people fighting computer crime and it is taken very seriously by government agencies.

What kind of software is a computer virus?

In computer security technology, a virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. A computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. Extending the analogy, the insertion of the virus into a program is termed infection, and the infected file (or executable code that is not part of a file) is called a host. Viruses are one of the several types of malware or malicious software.

What differentiates a worm from a macro virus?

Worms are programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file. Although worms generally exist inside of other files, often Word or Excel documents, there is a difference between how worms and viruses use the host file.

How does a denial of service attack work?

DoS is the short form of denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. For all known DoS attacks, there are software fixes that system administrators can install to limit the damage caused by the attacks. But, like viruses, new DoS attacks are constantly being dreamed up by hackers.

What is the effect of a virus hoax?

With increased use of the Internet there is a growing number of viruses that can be spread via email. Many computer users use the Internet to warn friends and colleagues of these threats. At the same time, there has also been a growth of virus hoax warnings. These warnings describe viruses with impossible characteristics. They can cause panic and lead to misconceptions about computer viruses. Forwarding these hoax warnings on only perpetuates the problem, and can waste time and system resources.

What is the difference between the Klez family of viruses and previous worms?

Klez is a computer worm that propagates via E-mail. It infects Microsoft Windows systems, exploiting a vulnerability in Internet Explorer, used by both Outlook and Outlook Express to render HTML mail.

Later variants of the worm would use a false From address, picking an email address at random from the infected machine's Outlook or Outlook



Download as:   txt (4.9 Kb)   pdf (83.2 Kb)   docx (11 Kb)  
Continue for 3 more pages »
Only available on
Citation Generator

(2010, 11). Crime and Forensics - Short-Answer Questions. Retrieved 11, 2010, from

"Crime and Forensics - Short-Answer Questions" 11 2010. 2010. 11 2010 <>.

"Crime and Forensics - Short-Answer Questions.", 11 2010. Web. 11 2010. <>.

"Crime and Forensics - Short-Answer Questions." 11, 2010. Accessed 11, 2010.