Computer Crime & Cyber-Security Flashcards

(7 cards)

1
Q

What are common types of computer crime?

A
  1. Hacking
    • Unauthorized access to computer systems or networks.
    • Can involve stealing data, damaging systems, or disrupting services.
    • Often done for personal gain, political reasons, or just for challenge.
    1. Phishing
      • Tricking people into giving personal information (e.g. passwords or credit card numbers).
      • Usually done through fake emails or websites that look real.
    2. Malware (e.g. viruses, worms, ransomware)
      • Malicious software designed to damage or control systems.
      • Ransomware locks files until a ransom is paid.
      • Worms and viruses can spread and corrupt data.
    3. Identity Theft
      • Stealing someone’s personal information to commit fraud.
      • Often done through phishing, spyware, or data breaches.
    4. Denial of Service (DoS) Attacks
      • Flooding a network or website with traffic to make it crash.
      • Used to disrupt businesses or services.
    5. Online Fraud and Scams
      • Includes fake online shops, lottery scams, or investment fraud.
      • Aimed at stealing money or details.
    6. Cyberbullying and Harassment
      • Using the internet to threaten, harass, or embarrass others.
      • Often happens on social media or messaging platforms.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name three email scams.

A
  1. Phishing: These emails seem to come from trusted sources, like banks or companies, and try to trick you into revealing personal information such as passwords or credit card numbers.
    1. Trojan Horse: These emails often contain attachments or links that, when clicked, download malicious software (malware) onto your device. The malware can steal personal data, track your activities, or damage your system.
    2. Impersonation Scams (Fake Services): This type involves an email pretending to be from popular services, like Netflix or Amazon, claiming there’s an issue with your account or payment. The email will ask you to click a link to verify your information, but it’s a scam designed to steal your login credentials or install malware.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name four ways of recognising fraudulent emails.

A
  1. Suspicious Sender Email Address: The sender’s email address may look similar to a legitimate one but with small changes, such as missing letters or extra characters. Always check the full email address, not just the display name.
    1. Urgent or Threatening Language: Fraudulent emails often use urgent language or threats, such as “Your account has been compromised!” or “Immediate action required!” to create a sense of urgency and pressure you into acting quickly without thinking.
    2. Generic Greetings: Scammers often use generic greetings like “Dear Customer” or “Dear User,” instead of addressing you by name. Legitimate companies that you have accounts with typically use your name in communications.
    3. Suspicious Links or Attachments: Fraudulent emails often include links that look official but lead to fake websites designed to steal your information, or they may contain attachments that could infect your device with malware. Always hover over links to check where they lead before clicking.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Computer Misuse Act?

A

The Computer Misuse Act 1990 is a UK law that makes it illegal to access or interfere with computer systems and data without permission. It covers:
1. Unauthorized access to computers.
2. Access with intent to commit a crime.
3. Unauthorized modification of computer data.
4. Creating, distributing, or possessing malicious software (malware).

The Act aims to protect against cybercrimes like hacking, data theft, and malware attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are four different types of computer misuse?

A

Computer misuse includes hacking, phishing, malware, and denial of service (DoS) attacks. Hacking involves unauthorized access to systems, often detectable through strange file changes or failed login attempts. Phishing tricks people into revealing personal information, often through suspicious emails. Malware, like viruses or ransomware, alters system files and can be identified by unusual system behavior or encryption of files. DoS attacks flood systems with excessive requests, making them slow or unresponsive, and can be noticed by a sudden loss of access to services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is hacking?

A

Hacking refers to the unauthorized access or manipulation of computer systems, networks, or devices, typically to steal, alter, or destroy data. Hackers use various techniques to break into systems, bypassing security measures to gain control or access sensitive information. It is considered illegal unless done with permission, such as in ethical hacking for security testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is malware?

A

Malware (short for malicious software) is any type of software designed to harm, exploit, or gain unauthorized access to a computer system or network. It includes viruses, worms, Trojans, ransomware, and spyware, which can damage files, steal sensitive data, or disrupt system operations. Malware is often spread through infected attachments, malicious websites, or links in phishing emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly