Chapter 2 Flashcards

(52 cards)

1
Q

What is R.A 10175?

A

Cybercrime Prevention Act of 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.”

A

Cubersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

involves protection of sensitive personal and business information through prevention, detection and response to different online attacks.

A

Cubersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You should disable these features when they are not in use.

A

Disabled Remote Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

an illegal act an individual commits to defrauding someone who is the actual credit card holder.

A

Credit Card Frauds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the concealment of the origins ofillegallyobtained money, typically by means of transfers involving foreign banks or legitimate businesses.

A

Money Laundering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pornographic Websites; online distribution

A

Cyber pornography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Millions of websites, all hosted on servers abroad, offer online gambling

A

Online gambling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Software Piracy; Copyright Infringement; Trademarks Violations; Theft of Computer Source Code

A

Intellectual Property (IP) Crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A spoofed email is one that appears to originate from one source but actually has been sent from another source.

A

Email spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This occurs when defamation takes place with the help of computers and/or the internet.

A

Cyber defamation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This involves following a person’s movements across the internet by posting messages (sometimes threatening) on bulletin boards frequented by the victim, entering chat rooms frequented by the victim, constantly bombarding the victim with emails etc.

A

Cyber Stalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Also known as “hacking”.

A

Unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It involves gaining access illegally to a computer system or network and in some cases making unauthorized use of this access.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the act by which other forms of cybercrime (e.g., fraud, terrorism) are committed.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

any information contained in electronic form such as that stored in computer hard disks, removal storage media

A

Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This refers to sending a large number of emails to the victim resulting in the victim’s email account or mail servers crashing.

A

Email Bombing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

These attacks are often used in committing financial crime and are based on the idea that an alteration, so insignificant, would go completely unnoticed in a single case.

A

Salami attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It is a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites.

A

Distributed denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

programs that attach themselves to a computer or a file then circulate themselves to other files and other computers on a network.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

They usually affect the data on computer either by altering or deleting it.

22
Q

They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on computer’s memory.

23
Q

These are event dependent programs where programs kicks into action only when a certain event occurs

24
Q

An unauthorized program which functions from inside what seems to be an authorized program thereby concealing what is actually doing.

A

Trojan attacks

25
This occurs when someone forcefully takes control of a website
Web-Jacking
26
Hacking designed to cause terror. Like conventional terrorism, ‘e-terrorism’ is utilized hacking to cause violence against persons or property, or at least cause enough harm to generate fear.
Cyber-Terrorism
27
can be broadly defined as an intentional act of deception involving financial transactions for purpose of personal gain.
Financial Fraud Crimes
28
a crime and is also a civil law violation.
Fraud
29
It means trying to trick or scam someone else using the internet.
Internet Fraud
30
use of potentially illegal means to obtain money, assets or other property owned or held by financial institution.
Bank Fraud
31
form of credit card fraud in which stolen credit card is used to charge pre-paid cards.
Carding
32
also known as identity fraud, a crime in which imposter obtains key pieces of personally identifiable info, such as Social security or driver’s license number in order to impersonate someone else.
Identity theft
33
a criminal offense of obtaining money, property, or services from an individual or institution, through coercion.
Extortion
34
It can be defined as an act of terrorism committed through the use of cyberspace or computer resources
Cyber-Terrorism
35
A personal, political or social gain by using computers and networks to threaten and compel a person, organization or even a government.
Cyber-Extortion
36
These hackers demand money in return for promising to stop the attacks and offer “protection”
Cyber -Extortion
37
any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
Spamming/spam
38
a scam where thieves attempt to steal personal or financial account information by sending deceptive electronic messages that trick unsuspecting consumers into disclosing personal information.
Phishing
39
unwanted and/or repeated surveillance by an individual or group toward another person.
Stalking
40
This type of stalker becomes upset when the friendship or romantic relationship has ended.
Rejected stalker
41
This type of stalker is not only self-centered and jealous but also over-dependent and persistent.
Rejected stalker
42
stalker feels humiliated that the relationship has ended and seeks revenge upon the victim.
Resentful stalker
43
are often irrationally paranoid and are known to verbally assault their victims.
Resentful stalker
44
stalker seeks power and sexual gratification
Predatory stalker
45
They will not make physical contact but will use surveillance to track the victim
Predatory stalker
46
stalker seeks an intimate and romantic relationship with the victim.
Intimacy seeker
47
stalker usually has inadequate social skills.
Incompetent suitor
48
They want a relationship with the victim but do not have the ability to realize he or she is not meant to be with the victim.
Incompetent suitor
49
This type of stalker feels that the victim loves them even though they may not have had any contact with the victim.
EROTOMANIA AND MORBIDLY INFATUATED
50
The stalker is usually paranoid, prefers suitors in a higher social class and repeatedly approach the victim.
EROTOMANIA AND MORBIDLY INFATUATED
51
It is the use of the internet or other electronic means to stalk or harass an individual, group, or organization may include false accusations, defamation, slander and libel.
Cyber Stalking
52