The Danger Of Cyber Crime Flashcards

(36 cards)

1
Q

What is phishing?

A

Tricking users into revealing confidential information by pretending to be a legitimate organisation via email.

Commonly used in cybercrime to steal personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define pharming.

A

Redirects a user to a fake website even when they enter the correct URL to steal personal data.

A more sophisticated attack than phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is click-jacking?

A

attack in which a site appears to do one thing but your clicks are actually redirected to do something else

Example: liking a page instead of downloading wallpaper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does spoofing refer to?

A

Forging an email header to make it look like it’s from someone else.

Often used in phishing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is spyware?

A

Monitors your computer activity and reports it to a third party.

Can lead to significant privacy violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define keylogger.

A

Records everything you type to steal login credentials.

A common tool used by cybercriminals to capture sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a computer virus?

A

Malicious program that disrupts your computer or spreads malware.

Can replicate itself and spread to other files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What distinguishes a computer worm from a virus?

A

A computer worm spreads across networks by itself.

Unlike viruses, worms do not need a host file to spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Trojan?

A

Disguised as useful software but harms your system when run.

Often used to gain unauthorized access to user systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ransomware?

A

Encrypts your files and demands payment to unlock them.

A severe form of malware that can lead to data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does adware do?

A

Pops up ads constantly; may install malware if interacted with.

Often bundled with free software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are bots in the context of cybercrime?

A

Infected computers controlled remotely, often part of a botnet.

Used for various malicious activities including DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define cyberstalking.

A

Persistent online stalking.

A form of harassment that can have serious emotional impacts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is spam?

A

Repeated, unwanted messages (like junk email).

Can clutter inboxes and lead to phishing attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are unauthorized uploads?

A

Posting pictures or content without consent.

Often violates privacy rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is cyberbullying?

A

Online threats, humiliation, and harassment.

Can occur through various online platforms.

17
Q

What are website attacks?

A

Often political or criminal, deface sites or bring them down.

Can involve hacking or DDoS tactics.

18
Q

Define DoS attacks.

A

Flood servers to shut them down using a network of bots .

Denial of Service attacks can disrupt services significantly.

19
Q

What is cyberterrorism?

A

Targeting national infrastructure (e.g. power grids).

Aimed at causing panic or disruption.

20
Q

What constitutes hardware theft?

A

Physical theft of devices.

Considered the least harmful form of computer crime.

21
Q

What is bandwidth theft?

A

Using others’ internet connections illegally.

Can slow down internet speeds for the owner.

22
Q

Define identity theft.

A

Stealing someone’s information to impersonate them online.

Can lead to financial loss and reputational damage.

23
Q

What is processing theft?

A

Hijacking devices’ CPU power (e.g. in botnets).

Often used for mining cryptocurrencies without the owner’s consent.

24
Q

What is data theft?

A

Stealing confidential data, often through hacking or USBs.

Can include sensitive personal and corporate information.

25
Define intellectual property theft.
Stealing trade secrets, software, or product designs. ## Footnote A serious offense that can lead to legal repercussions.
26
What is money theft in the context of cybercrime?
Hacking bank accounts, skimming cards, or running scams. ## Footnote Directly impacts victims' finances.
27
What does piracy involve?
Illegally copying and distributing copyrighted media. ## Footnote Violates copyright laws and can harm creators financially.
28
What is the purpose of anti-virus software?
Detects and removes malware. ## Footnote Examples include Norton, Avast, AVG, Kaspersky.
29
What are anti-spyware features?
Now built into most anti-virus tools. ## Footnote Essential for protecting against spyware.
30
Why are regular updates essential for protection?
They help protect against new threats and vulnerabilities. ## Footnote Keeping software up to date is crucial.
31
Fill in the blank: Always check for _______ and lock symbol when banking/shopping online.
https
32
What are strong passwords?
Complex passwords that are changed regularly. ## Footnote Help secure accounts against unauthorized access.
33
What should you never do regarding personal information?
Share personal info unless necessary and secure. ## Footnote Protecting personal data is vital.
34
What should you avoid clicking on?
Suspicious pop-ups or links. ## Footnote Can lead to malware infections.
35
True or False: You should open email attachments if you’re unsure of the sender.
False
36
What is the Paranoid ABC of Online Safety?
Assume nothing, believe no one, check everything. ## Footnote A guideline for maintaining online security.