TOPIC 1: CRIME AND SECURITY Flashcards
(20 cards)
What are email scams?
Fraudulent messages designed to deceive recipients into providing personal information or money.
Email scams often impersonate legitimate organizations or individuals.
What are common characteristics of email scams?
Typically include:
* Urgency
* Poor grammar and spelling
* Generic greetings
* Unusual sender addresses
* Suspicious links or attachments
These traits often signal that the email is not legitimate.
What are the types of email scams?
Include:
* Phishing
* Spoofing
* Advance-fee scams
* Lottery scams
* Tech support scams
Each type targets victims in different ways.
What are common characteristics of phishing attempts?
Often involve:
* Fake websites
* Requests for sensitive information
* Sense of urgency
* Threats of account suspension
Phishing aims to trick users into revealing personal data.
What are the risks associated with malware, hacking, and other cyber threats?
Can lead to:
* Data loss
* Identity theft
* Financial loss
* System damage
These risks affect both individuals and organizations.
What are key security measures to protect against cyber threats?
Include:
* Firewalls
* Antivirus software
* Strong passwords
* Regular updates
Implementing these measures enhances security.
How can you create a strong password?
A strong password should:
* Be at least 12 characters long
* Include uppercase and lowercase letters
* Contain numbers and symbols
* Avoid common words or phrases
A strong password reduces the risk of unauthorized access.
What indicates a secure website?
Look for:
* HTTPS in the URL
* A padlock symbol in the address bar
These elements signal that the website is secure for transactions.
What constitutes a computer crime?
Any illegal activity involving a computer, such as unauthorized access to data or systems.
Computer crimes can target individuals, organizations, or governments.
What are different types of computer crimes?
Include:
* Hacking
* Identity theft
* Data breaches
* Online fraud
These crimes vary in methods and impacts.
What is the impact of computer crimes on individuals and businesses?
Can result in:
* Financial losses
* Reputation damage
* Legal consequences
* Emotional distress
Both individuals and businesses face significant repercussions.
Define hacking.
Unauthorized access to or manipulation of computer systems or networks.
Hacking can be done for malicious purposes or ethical considerations.
What is cyberbullying?
Harassment or intimidation using digital platforms.
Cyberbullying can have severe emotional and psychological effects.
What is software piracy?
The illegal copying or distribution of software.
Software piracy undermines the rights of developers and companies.
What is online fraud?
Deceptive practices conducted online to secure financial or personal gain.
Online fraud encompasses various scams and fraudulent activities.
How do laws like the Computer Misuse Act help protect users?
By establishing legal penalties for unauthorized access and misuse of computers.
Such laws deter potential offenders and provide recourse for victims.
What is personal data?
Information that relates to an identifiable individual, such as name, address, and financial details.
Protecting personal data is crucial in the digital age.
Why does personal data need protection?
To prevent identity theft, fraud, and unauthorized access to sensitive information.
Safeguarding personal data is essential for privacy and security.
How can you protect personal information?
By using:
* Privacy settings
* Two-factor authentication
* Avoiding oversharing on social media
These practices help maintain personal security online.
What are the health risks of computer use?
Can include:
* Eye strain
* Poor posture
* Repetitive strain injuries
* Mental health issues
Prolonged computer use can lead to various health concerns.