Podcast
Questions and Answers
Computer risk is any threat, action, or event that will negatively impact assets through exploiting a vulnerability; resulting in: damaging or loosing computer hardware, data and information, reducing or stopping the processing capabilities, or breaching security that would harm an organization or an individual.
Computer risk is any threat, action, or event that will negatively impact assets through exploiting a vulnerability; resulting in: damaging or loosing computer hardware, data and information, reducing or stopping the processing capabilities, or breaching security that would harm an organization or an individual.
False
Cybercrime is any illegal act via the internet, people who commit or prepare to such crimes are called cyber criminals and are categorized to: hackers, crackers, script kiddies, cyber extortionists, cyber terrorists, unethical employees and corporate espionage.
Cybercrime is any illegal act via the internet, people who commit or prepare to such crimes are called cyber criminals and are categorized to: hackers, crackers, script kiddies, cyber extortionists, cyber terrorists, unethical employees and corporate espionage.
False
A hacker is a professional with malicious intentions to destroy, steal, or spy on data by gaining access to computers or networks illegally.
A hacker is a professional with malicious intentions to destroy, steal, or spy on data by gaining access to computers or networks illegally.
False
Nowadays computers play a critical role in all our life aspects. Operations such as storage and management of information, communications, and selling, purchasing, and banking operations all rely on computers.
Nowadays computers play a critical role in all our life aspects. Operations such as storage and management of information, communications, and selling, purchasing, and banking operations all rely on computers.
Signup and view all the answers
Cyber criminals are categorized into various types including: hackers, crackers, script kiddies, cyber extortionists, cyber terrorists, unethical employees and corporate espionage.
Cyber criminals are categorized into various types including: hackers, crackers, script kiddies, cyber extortionists, cyber terrorists, unethical employees and corporate espionage.
Signup and view all the answers
Measures were crucial to protect computers and its information whether stored or transmitted from being lost, damaged, or stolen.
Measures were crucial to protect computers and its information whether stored or transmitted from being lost, damaged, or stolen.
Signup and view all the answers
Script kiddies refers to unskilled users who depend on premade scripts or programs to gain illegal access to a computer, network, or application, with no knowledge of how to hack or how the script works and just to impress friends and appear as technology expert.
Script kiddies refers to unskilled users who depend on premade scripts or programs to gain illegal access to a computer, network, or application, with no knowledge of how to hack or how the script works and just to impress friends and appear as technology expert.
Signup and view all the answers
A cracker is a professional with malicious intentions to gain illegal access to a computer, network, or application to destroy, steal data, or breaking a proprietary software protection violating the license agreement and allowing users to use it for free (piracy), or cracking a password.
A cracker is a professional with malicious intentions to gain illegal access to a computer, network, or application to destroy, steal data, or breaking a proprietary software protection violating the license agreement and allowing users to use it for free (piracy), or cracking a password.
Signup and view all the answers
Cyber extortionists (blackmailers via internet) threaten to disclose private or confidential information of an individual or an organization if not paid an amount of money.
Cyber extortionists (blackmailers via internet) threaten to disclose private or confidential information of an individual or an organization if not paid an amount of money.
Signup and view all the answers
An organized highly skilled team uses the internet or networks to destroy or damage computers for political reasons; targeting the infrastructure electronically to hinder or completely stop computers at ministries, governmental organizations, air traffic control system, stock market system, energy generating systems, etc., which could lead to crippling a whole country or a government. This describes cyber terrorists.
An organized highly skilled team uses the internet or networks to destroy or damage computers for political reasons; targeting the infrastructure electronically to hinder or completely stop computers at ministries, governmental organizations, air traffic control system, stock market system, energy generating systems, etc., which could lead to crippling a whole country or a government. This describes cyber terrorists.
Signup and view all the answers
Unethical employees might exploit vulnerabilities in the computer system of the company they work for, or break into other staff computers to steal confidential information and sell it to a rival company either for financial gains or for revenge after being fired.
Unethical employees might exploit vulnerabilities in the computer system of the company they work for, or break into other staff computers to steal confidential information and sell it to a rival company either for financial gains or for revenge after being fired.
Signup and view all the answers
Some corporates specialize in providing espionage services, with a highly skilled team in computers and communications. An unethical corporate could hire espionage corporate to spy on and steal other rival corporates' ideas and gain a competitive advantage unethically. This is known as corporate espionage.
Some corporates specialize in providing espionage services, with a highly skilled team in computers and communications. An unethical corporate could hire espionage corporate to spy on and steal other rival corporates' ideas and gain a competitive advantage unethically. This is known as corporate espionage.
Signup and view all the answers
Computers that are connected to the internet are at a higher risk than computers within a house or an organization’s premises.
Computers that are connected to the internet are at a higher risk than computers within a house or an organization’s premises.
Signup and view all the answers
A virus is a malicious program that negatively affects the computer by changing the way it normally works, without the user's permission and knowledge.
A virus is a malicious program that negatively affects the computer by changing the way it normally works, without the user's permission and knowledge.
Signup and view all the answers
Virus have many types: boot-sector virus that infects the boot sector on the hard disks and prevent.
Virus have many types: boot-sector virus that infects the boot sector on the hard disks and prevent.
Signup and view all the answers
Study Notes
Computer Risks
- Any threat, action, or event that can negatively impact assets by exploiting a vulnerability, leading to damage or loss of computer hardware, data, and information, or a breach of security that can harm an organization or individual.
Cybercrime
- Any illegal act committed via the internet, involving cybercriminals such as hackers, crackers, script kiddies, cyber extortionists, cyber terrorists, unethical employees, and corporate espionage.
Cybercriminals
- Hackers: professionals with malicious intentions to destroy, steal, or spy on data by gaining illegal access to computers or networks.
- Crackers: professionals who illegally access computers, networks, or applications to destroy, steal data, or break proprietary software protection.
- Script Kiddies: unskilled users who use premade scripts or programs to gain illegal access to computers, networks, or applications, often to impress friends and appear as technology experts.
- Cyber Extortionists: individuals who threaten to disclose private or confidential information if not paid a ransom.
- Cyber Terrorists: highly skilled teams that use the internet or networks to destroy or damage computers for political reasons, targeting critical infrastructure.
- Unethical Employees: individuals who exploit vulnerabilities in their company's computer system or break into colleagues' computers to steal confidential information.
- Corporate Espionage: companies that provide espionage services to spy on and steal rivals' ideas, gaining a competitive advantage unethically.
Types of Malware
- Viruses: malicious programs that negatively affect computers, changing their normal functioning without the user's permission or knowledge. Examples include boot-sector viruses that infect the boot sector on hard disks and prevent booting.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge of computer security measures and protection of information with this quiz based on Chapter 11 of AIU's Faculty of Informatics and Communications CS course. Explore topics such as data encryption, network security, and risk management.