Crime and security Flashcards
(22 cards)
What is cybercrime?
Criminal activities that are conducted via the internet or through the use of computer technology.
True or False: Phishing is a method used to steal personal information.
True
Fill in the blank: __________ is the practice of protecting systems, networks, and programs from digital attacks.
Cybersecurity
Which of the following is NOT a type of malware? (A) Virus (B) Trojan (C) Firewall (D) Worm
C) Firewall
What is a firewall?
A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
True or False: A strong password should include a mix of letters, numbers, and special characters.
True
What is social engineering in the context of cybersecurity?
Manipulating individuals into divulging confidential or personal information.
Fill in the blank: __________ is software designed to disrupt, damage, or gain unauthorized access to computer systems.
Malware
What is the purpose of encryption?
To protect information by converting it into a code to prevent unauthorized access.
True or False: All cybercrimes are reported to law enforcement.
False
What is the main goal of a hacker?
To gain unauthorized access to systems or data, often for malicious purposes.
Multiple Choice: Which of the following is a common method of gaining unauthorized access? (A) Keylogging (B) Antivirus software (C) Backup systems (D) Firewalls
A) Keylogging
What is identity theft?
The fraudulent acquisition and use of a person’s private identifying information.
Fill in the blank: A __________ is a program that replicates itself to spread to other computers.
Virus
What are two-factor authentication methods?
Security processes that require two different forms of identification before access is granted.
True or False: Cyberbullying can occur through social media platforms.
True
Fill in the blank: __________ refers to unauthorized access to a computer or network.
Hacking
What is ransomware?
A type of malware that encrypts a user’s files and demands a ransom payment to restore access.
Multiple Choice: Which of the following is a sign of a phishing attempt? (A) Unexpected emails requesting personal information (B) Emails from known contacts (C) Emails with clear subject lines (D) Professional language
A) Unexpected emails requesting personal information
What is the role of an antivirus program?
To detect, prevent, and remove malicious software from a computer.
True or False: Regular software updates can help protect against security vulnerabilities.
True
What is the significance of a security breach?
It indicates that unauthorized access has occurred, potentially compromising sensitive data.