The Danger Of Cyber Crime Flashcards
(36 cards)
What is phishing?
Tricking users into revealing confidential information by pretending to be a legitimate organisation via email.
Commonly used in cybercrime to steal personal data.
Define pharming.
Redirects a user to a fake website even when they enter the correct URL to steal personal data.
A more sophisticated attack than phishing.
What is click-jacking?
attack in which a site appears to do one thing but your clicks are actually redirected to do something else
Example: liking a page instead of downloading wallpaper.
What does spoofing refer to?
Forging an email header to make it look like it’s from someone else.
Often used in phishing attacks.
What is spyware?
Monitors your computer activity and reports it to a third party.
Can lead to significant privacy violations.
Define keylogger.
Records everything you type to steal login credentials.
A common tool used by cybercriminals to capture sensitive information.
What is a computer virus?
Malicious program that disrupts your computer or spreads malware.
Can replicate itself and spread to other files.
What distinguishes a computer worm from a virus?
A computer worm spreads across networks by itself.
Unlike viruses, worms do not need a host file to spread.
What is a Trojan?
Disguised as useful software but harms your system when run.
Often used to gain unauthorized access to user systems.
What is ransomware?
Encrypts your files and demands payment to unlock them.
A severe form of malware that can lead to data loss.
What does adware do?
Pops up ads constantly; may install malware if interacted with.
Often bundled with free software.
What are bots in the context of cybercrime?
Infected computers controlled remotely, often part of a botnet.
Used for various malicious activities including DDoS attacks.
Define cyberstalking.
Persistent online stalking.
A form of harassment that can have serious emotional impacts.
What is spam?
Repeated, unwanted messages (like junk email).
Can clutter inboxes and lead to phishing attempts.
What are unauthorized uploads?
Posting pictures or content without consent.
Often violates privacy rights.
What is cyberbullying?
Online threats, humiliation, and harassment.
Can occur through various online platforms.
What are website attacks?
Often political or criminal, deface sites or bring them down.
Can involve hacking or DDoS tactics.
Define DoS attacks.
Flood servers to shut them down using a network of bots .
Denial of Service attacks can disrupt services significantly.
What is cyberterrorism?
Targeting national infrastructure (e.g. power grids).
Aimed at causing panic or disruption.
What constitutes hardware theft?
Physical theft of devices.
Considered the least harmful form of computer crime.
What is bandwidth theft?
Using others’ internet connections illegally.
Can slow down internet speeds for the owner.
Define identity theft.
Stealing someone’s information to impersonate them online.
Can lead to financial loss and reputational damage.
What is processing theft?
Hijacking devices’ CPU power (e.g. in botnets).
Often used for mining cryptocurrencies without the owner’s consent.
What is data theft?
Stealing confidential data, often through hacking or USBs.
Can include sensitive personal and corporate information.