VT Chapter 10 Flashcards

(52 cards)

1
Q

cybercrime

A

criminal activity on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cyber bullying

A

between minors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cyber harassment

A

between adults

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

cyber stalking

A

stalker demonstrates a pattern of harassment that poses a credible threat of harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

phishing

A

uses email message or IMs that appear to be from someone you know to trick you into revealing personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

pharming

A

redirects you to a phony website by hijacking the domain name or poisoning the DNS server references to a site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

clickjacking

A

when clicking on a link allows malware to post unwanted links on your page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

computer fraud

A

convince a victim to voluntarily give money or property to another person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

shill bidding

A

fake bidding by the seller or an accomplice to drive up the price of an auction item

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identity theft

A

someone fraudulently uses your name, Soc., or bank/credit card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

keyloggers

A

programs or devices that capture what is typed on a keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

hacking

A

act of gaining unauthorized access to a computer system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hacktivism

A

hacking to make a political statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

data breach

A

when sensitive data is stolen or viewed by someone who is not authorized to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

cyber terrorism

A

unlawful attack on computers or networks to intimidate a government or its people for a political or social agenda

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_________ is criminal activity on the internet.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_______ gain unauthorized access to computer systems or networks.

A

Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A _______ exposes sensitive data to unauthorized eyes

A

data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

malware

A

malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

spamming

A

sending mass unsolicited emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

spam

22
Q

cookie

A

small text file placed on your computer when you visit a website that helps identify you when you return

23
Q

Adware

A

pop ups or banner ads on websites or in software

24
Q

Spyware

A

form of malware that secretly gathers personal information about you

25
browser hijacker
changes your home page and redirects you to other websites
26
virus
a program that replicates itself and infects computers
27
payload
The virus attack; may corrupt or delete files or it may erase an entire disk
28
logic bomb
behaves like a virus but doesnt spread to other machines
29
worm
self replicating, but it doesnt need a host to travel.
30
botnet
network of infected computer zombie or bots
31
denial of service attack
sending out so much traffic that it cripples a server or network
32
Trojan horse
program that appears to be a legit program but is actually something malicious
33
Ransomware
malware that prevents you from using your computer until you pay a fine or fee
34
bitcoin
anonymous, digital, encrypted currency
35
rootkit
set of programs that enables someone to gain control over a computer system while hiding the fact that the computer has been compromised
36
_______ is a common way to distribute malware.
Spam
37
drive by download
when you visit a website that installs a program in the background without your knowledge
38
firewall
hardware device that blocks unauthorized access to your networks
39
Antivirus program
provide protection against viruses, trojans, worms and spyware.
40
Antispyware software
prevents adware and spyware software from installing itself on your computer and can be used to clean an infected machine
41
Security Suites
packages of security software that includes a combination of features such as antivirus, firewall and privacy protection
42
router
device that connects two or more networks together
43
Wireless encryption
encrypting transmitted data
44
________ shields your computers from the public network
Network address translation
45
Encryption
converts unencrypted, plain text, into code called ciphertext
46
bugs
flaws in the programming
47
patch/hotfix
addresses individual problems as they are discovered
48
Service pack
large planned update that addresses multiple problems or adds multiple features
49
Zero day exploit
attack that occurs on the day an exploit is discovered, before the publisher of the compromised software can fix it
50
________ will notify you before changes are made to your computer
User Account Control (UAC)
51
______ converts plain text into code
Encryption
52
_______ is the best place to file a cybercrime report.
Internet Crime Complaint Center (IC3)