Dangers of computer crime Flashcards
(16 cards)
1
Q
What is meant by ‘theft of computer hardware’?
A
- Theft of physical components of a computer system
- Includes internal parts (e.g. RAM, GPU)
- Also includes external devices (keyboard, mouse)
- Even full devices like laptops and smartphones
2
Q
Why is hardware theft dangerous?
A
- Hardware is expensive to replace
- May contain sensitive personal or business data
- Can disrupt work or study
3
Q
How can you protect against hardware theft?
A
- Never leave devices unattended in public
- Use strong passwords
- Secure devices with lock cables at desks
4
Q
What is software theft?
A
- Using or distributing software illegally
- Includes copying CDs/DVDs or pirated downloads
- Form of digital crime (software piracy)
5
Q
Why is software theft illegal and dangerous?
A
- Breaks copyright laws
- Can lead to legal consequences
- Often leads to use of unsecure or infected software
6
Q
How can you avoid software theft?
A
- Only install licensed software
- Never duplicate/distribute software illegally
- Do not lend software for copying
- Avoid downloading pirated software
7
Q
What is bandwidth theft?
A
- Using someone else’s internet connection without permission
- Can be done via stolen login info or unsecured Wi-Fi
- A form of resource theft
8
Q
What are the dangers of bandwidth theft?
A
- Slows down the victim’s connection
- Can result in high data costs
- May expose networks to malware or illegal activities
9
Q
How can you prevent bandwidth theft?
A
- Use strong passwords for networks
- Secure Wi-Fi with encryption (e.g., WPA2)
10
Q
What is ‘hotlinking’ in the context of bandwidth theft?
A
- Linking to media hosted on another website
- Each access uses the other site’s bandwidth
- Can be costly for the original content owner
11
Q
What is identity theft?
A
- Stealing personal data to impersonate someone else
- Can involve names, ID numbers, login credentials
- Used to access accounts, open loans, etc.
12
Q
What are the dangers of identity theft?
A
- Loss of money or credit
- Misuse of your social media/accounts
- Legal or personal consequences from impersonation
13
Q
How can you protect against identity theft?
A
- Share personal info selectively
- Use strong, secure passwords
- Avoid reusing email/credentials on every site
- Be cautious of phishing sites
14
Q
Why is your personal information valuable?
A
- Can reveal interests, habits, and preferences
- Used by advertisers to target you
- Forms part of your digital footprint
15
Q
How is personal data commonly misused?
A
- Search engines log your queries
- Platforms track viewing habits
- Data sold to third-party advertisers
16
Q
What is ‘theft of time’?
A
- Online scams aimed at stealing money or data
- Involves deception, fake websites, fake identities