Computer Criminal Categories

Computer Criminal Categories

Created by
@EnergyEfficientApostrophe

Questions and Answers

Which category of computer criminals commit business or information sabotage for personal gain?

People with technical knowledge

What motivates career criminals to use computers in their crimes?

To assist in crimes

What is the impact of unauthorized access to computer systems?

Stealing information, stealing use of computer resources, and accessing systems with the intent to commit information modification

What is an example of industrial espionage?

<p>Business sabotage</p> Signup and view all the answers

What is a zero-day?

<p>An undisclosed hardware or software vulnerability</p> Signup and view all the answers

What is an example of an insider threat?

<p>Insider abuse</p> Signup and view all the answers

What is a common threat to IS security due to employee negligence?

<p>Careless employees leave computer monitors on for view</p> Signup and view all the answers

What is a type of malicious software that demands payment in exchange for restoring access to data?

<p>Ransomware</p> Signup and view all the answers

What is a reason why fired employees may pose a threat to an organization's IS security?

<p>They may be resentful and install harmful code</p> Signup and view all the answers

What is a risk associated with jailbreaking a mobile device?

<p>Allowing unsecured apps to be loaded</p> Signup and view all the answers

What type of cyber attack is a backup policy designed to protect against?

<p>Ransomware</p> Signup and view all the answers

What is a type of attack that involves flooding a system with traffic in order to make it unavailable?

<p>Denial of service</p> Signup and view all the answers

What is the primary motivation of hacktivist groups like Anonymous?

<p>Political or ideological goals</p> Signup and view all the answers

What is a risk associated with lost mobile devices without the capability to remotely wipe data?

<p>Data on the device can be accessed by unauthorized personnel</p> Signup and view all the answers

What is the term for the unauthorized use of a company's internal resources or information by an employee or contractor?

<p>Insider threat</p> Signup and view all the answers

What is the primary purpose of end-to-end encryption?

<p>To prevent unauthorized access to confidential files</p> Signup and view all the answers

What is the term for the use of cyber attacks to gather sensitive information or disrupt operations for competitive advantage?

<p>Industrial espionage</p> Signup and view all the answers

What is the term for the process of testing one's own systems to identify vulnerabilities?

<p>Penetration testing</p> Signup and view all the answers

More Quizzes Like This

Computer Security and Ethics Quiz
10 questions
Computer Hacking and Cybercrimes
10 questions
Cyber Crime and Hacking
12 questions
Cyber Crime Tactics and Techniques
18 questions
Use Quizgecko on...
Browser
Browser