TOPIC 1: CRIME AND SECURITY Flashcards

(20 cards)

1
Q

What are email scams?

A

Fraudulent messages designed to deceive recipients into providing personal information or money.

Email scams often impersonate legitimate organizations or individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are common characteristics of email scams?

A

Typically include:
* Urgency
* Poor grammar and spelling
* Generic greetings
* Unusual sender addresses
* Suspicious links or attachments

These traits often signal that the email is not legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the types of email scams?

A

Include:
* Phishing
* Spoofing
* Advance-fee scams
* Lottery scams
* Tech support scams

Each type targets victims in different ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are common characteristics of phishing attempts?

A

Often involve:
* Fake websites
* Requests for sensitive information
* Sense of urgency
* Threats of account suspension

Phishing aims to trick users into revealing personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the risks associated with malware, hacking, and other cyber threats?

A

Can lead to:
* Data loss
* Identity theft
* Financial loss
* System damage

These risks affect both individuals and organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are key security measures to protect against cyber threats?

A

Include:
* Firewalls
* Antivirus software
* Strong passwords
* Regular updates

Implementing these measures enhances security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can you create a strong password?

A

A strong password should:
* Be at least 12 characters long
* Include uppercase and lowercase letters
* Contain numbers and symbols
* Avoid common words or phrases

A strong password reduces the risk of unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What indicates a secure website?

A

Look for:
* HTTPS in the URL
* A padlock symbol in the address bar

These elements signal that the website is secure for transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What constitutes a computer crime?

A

Any illegal activity involving a computer, such as unauthorized access to data or systems.

Computer crimes can target individuals, organizations, or governments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are different types of computer crimes?

A

Include:
* Hacking
* Identity theft
* Data breaches
* Online fraud

These crimes vary in methods and impacts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the impact of computer crimes on individuals and businesses?

A

Can result in:
* Financial losses
* Reputation damage
* Legal consequences
* Emotional distress

Both individuals and businesses face significant repercussions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define hacking.

A

Unauthorized access to or manipulation of computer systems or networks.

Hacking can be done for malicious purposes or ethical considerations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is cyberbullying?

A

Harassment or intimidation using digital platforms.

Cyberbullying can have severe emotional and psychological effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is software piracy?

A

The illegal copying or distribution of software.

Software piracy undermines the rights of developers and companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is online fraud?

A

Deceptive practices conducted online to secure financial or personal gain.

Online fraud encompasses various scams and fraudulent activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do laws like the Computer Misuse Act help protect users?

A

By establishing legal penalties for unauthorized access and misuse of computers.

Such laws deter potential offenders and provide recourse for victims.

17
Q

What is personal data?

A

Information that relates to an identifiable individual, such as name, address, and financial details.

Protecting personal data is crucial in the digital age.

18
Q

Why does personal data need protection?

A

To prevent identity theft, fraud, and unauthorized access to sensitive information.

Safeguarding personal data is essential for privacy and security.

19
Q

How can you protect personal information?

A

By using:
* Privacy settings
* Two-factor authentication
* Avoiding oversharing on social media

These practices help maintain personal security online.

20
Q

What are the health risks of computer use?

A

Can include:
* Eye strain
* Poor posture
* Repetitive strain injuries
* Mental health issues

Prolonged computer use can lead to various health concerns.