Dangers of computer crime Flashcards

(16 cards)

1
Q

What is meant by ‘theft of computer hardware’?

A
  • Theft of physical components of a computer system
  • Includes internal parts (e.g. RAM, GPU)
  • Also includes external devices (keyboard, mouse)
  • Even full devices like laptops and smartphones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is hardware theft dangerous?

A
  • Hardware is expensive to replace
  • May contain sensitive personal or business data
  • Can disrupt work or study
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can you protect against hardware theft?

A
  • Never leave devices unattended in public
  • Use strong passwords
  • Secure devices with lock cables at desks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is software theft?

A
  • Using or distributing software illegally
  • Includes copying CDs/DVDs or pirated downloads
  • Form of digital crime (software piracy)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is software theft illegal and dangerous?

A
  • Breaks copyright laws
  • Can lead to legal consequences
  • Often leads to use of unsecure or infected software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you avoid software theft?

A
  • Only install licensed software
  • Never duplicate/distribute software illegally
  • Do not lend software for copying
  • Avoid downloading pirated software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is bandwidth theft?

A
  • Using someone else’s internet connection without permission
  • Can be done via stolen login info or unsecured Wi-Fi
  • A form of resource theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the dangers of bandwidth theft?

A
  • Slows down the victim’s connection
  • Can result in high data costs
  • May expose networks to malware or illegal activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can you prevent bandwidth theft?

A
  • Use strong passwords for networks
  • Secure Wi-Fi with encryption (e.g., WPA2)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ‘hotlinking’ in the context of bandwidth theft?

A
  • Linking to media hosted on another website
  • Each access uses the other site’s bandwidth
  • Can be costly for the original content owner
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is identity theft?

A
  • Stealing personal data to impersonate someone else
  • Can involve names, ID numbers, login credentials
  • Used to access accounts, open loans, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the dangers of identity theft?

A
  • Loss of money or credit
  • Misuse of your social media/accounts
  • Legal or personal consequences from impersonation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can you protect against identity theft?

A
  • Share personal info selectively
  • Use strong, secure passwords
  • Avoid reusing email/credentials on every site
  • Be cautious of phishing sites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is your personal information valuable?

A
  • Can reveal interests, habits, and preferences
  • Used by advertisers to target you
  • Forms part of your digital footprint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is personal data commonly misused?

A
  • Search engines log your queries
  • Platforms track viewing habits
  • Data sold to third-party advertisers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ‘theft of time’?

A
  • Online scams aimed at stealing money or data
  • Involves deception, fake websites, fake identities