Cybercrime and Computer Security
28 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of backup only saves the files that have changed since the last backup?

  • Incremental backup (correct)
  • Full backup
  • Image backup
  • Differential backup
  • Which situation is least likely to fall under unauthorized access?

  • A hacker breaking into a secured server
  • An employee sharing their password with a colleague
  • A user accessing their own account from a public computer (correct)
  • A phishing attempt targeting sensitive information
  • What is the primary purpose of a surge protector?

  • To filter out internet traffic
  • To prevent power surges from damaging devices (correct)
  • To boost the performance of electronics
  • To store backup files in case of power failure
  • What is the method known as 'social engineering' primarily aimed at?

    <p>Convincing individuals to divulge confidential information</p> Signup and view all the answers

    Which of the following is NOT a characteristic of scareware?

    <p>It enhances the computer's security features</p> Signup and view all the answers

    Which storage option is generally considered the most secure for backing up sensitive files?

    <p>Online cloud storage</p> Signup and view all the answers

    In the context of theft prevention, what does encryption software do?

    <p>Make data unreadable without a proper password</p> Signup and view all the answers

    What is pharming primarily intended to achieve?

    <p>To manipulate users into entering sensitive information on counterfeit websites</p> Signup and view all the answers

    What is the main purpose of a computer virus?

    <p>To steal and damage data</p> Signup and view all the answers

    Which category of virus is triggered by a specific date and time?

    <p>Time bomb</p> Signup and view all the answers

    What distinguishes worms from other types of viruses?

    <p>Worms do not require human interaction to spread</p> Signup and view all the answers

    Which type of hacker legally breaks into systems to report vulnerabilities?

    <p>White-hat hacker</p> Signup and view all the answers

    What classification of viruses periodically changes their code to avoid detection?

    <p>Polymorphic viruses</p> Signup and view all the answers

    Which of the following is a characteristic of an email virus?

    <p>Uses the victim's address book to spread</p> Signup and view all the answers

    What is the first step in preventing virus infections?

    <p>Keeping antivirus software up to date</p> Signup and view all the answers

    What defines a black-hat hacker?

    <p>Individuals who illegally break in for financial gain</p> Signup and view all the answers

    Which type of virus is activated by specific logic conditions?

    <p>Logic bomb virus</p> Signup and view all the answers

    What is the main function of antivirus software?

    <p>To detect and protect against viruses</p> Signup and view all the answers

    What is a primary function of a Trojan horse in the context of computer security?

    <p>To install backdoor programs/rootkits</p> Signup and view all the answers

    What describes a zombie computer in cybersecurity?

    <p>A computer controllable by a hacker</p> Signup and view all the answers

    How do distributed denial-of-service (DDoS) attacks typically operate?

    <p>By using multiple computers as zombies</p> Signup and view all the answers

    What type of ports can be manually closed using a firewall?

    <p>Logical ports</p> Signup and view all the answers

    Which of the following biometric authentication methods provides a unique measure based on physical traits?

    <p>Voice recognition</p> Signup and view all the answers

    Which type of spyware is designed to monitor and log keystrokes?

    <p>Keystroke logger program</p> Signup and view all the answers

    What is the main purpose of a spam filter?

    <p>To identify and block unwanted emails</p> Signup and view all the answers

    Which option is not a legitimate tactic to minimize spam?

    <p>Ignore all incoming messages</p> Signup and view all the answers

    What is a function of Windows Defender in relation to spyware?

    <p>It scans for spyware</p> Signup and view all the answers

    What is the consequence of a denial-of-service attack?

    <p>Legitimate users are denied access</p> Signup and view all the answers

    Study Notes

    Cybercrime and Identity Theft

    • Cybercrime is any criminal act primarily performed through a computer.
    • Cybercriminals use computers, networks, and the internet to commit crimes.
    • Common types of cybercrimes include FBI impersonation, identity theft (stealing bank data), non-delivery scams (selling nonexistent items), and advanced fee fraud (demanding upfront payments).

    Hacking

    • Hacking involves unauthorized computer access.

    Computer Viruses

    • Viruses are computer programs that attach themselves to other programs.
    • Viruses can infect smartphones and tablets, as well as traditional computers.
    • Viruses require user interaction to spread.
    • The primary purpose of a virus is to steal or damage data and cause harm.
    • Viruses may also have secondary objectives such as network disruptions or data breaches.
    • Ways to become infected include downloading files from untrustworthy websites or opening email attachments from unknown sources.

    Major Virus Categories

    • Boot-sector viruses: These viruses replicate onto a hard drive's boot sector and execute during system start-up. They load into memory before the antivirus runs.
    • Logic bomb viruses: These viruses are triggered when specific conditions, such as a certain date or file opening, are met.
    • Time bomb viruses: These viruses activate on a set date and time.
    • Worms: Worms are self-replicating programs that spread independently without user interaction. They spread using various methods, like email attachments or network connections. They are more active in spreading compared to viruses.
    • Email viruses: These spread via email attachments.
    • Encryption viruses (ransomware): Encryption viruses encrypt files and demand payment to unlock them.

    Viruses Classification

    • Some viruses disguise their activities, utilizing particular methods to avoid detection:
    • Polymorphic viruses: These viruses change their code periodically to avoid detection by antivirus software.
    • Multipartite viruses: These viruses affect different file types in attempts to bypass detection methods.
    • Stealth viruses: These viruses hide in active memory when the hard drive is scanned, thus evading detection.

    Preventing Virus Infections

    • Antivirus software is crucial for detecting and protecting computers from viruses.
    • Antivirus software should be kept up to date.

    Understanding Hackers

    • Hackers are individuals who gain unauthorized access to computers.
    • Hackers are categorized by their motives: white-hat hackers (ethical hackers), black-hat hackers (those who gain illegal access), and grey-hat hackers.
    • Trojan horses and rootkits are malicious programs that appear to be legitimate for gaining access without the user's knowledge.

    Denial-of-Service Attacks

    • Denial-of-service attacks use numerous compromised computers (zombies) to overwhelm a system or network with requests, leading to its shutdown and denial of legitimate use.

    Restricting Access to Digital Assets

    • Firewalls are hardware or software that block access to specific network ports, preventing unwanted access.
    • Passwords should be strong to defend against unauthorized access.
    • Biometric authentication methods (e.g., fingerprint, iris recognition) enhance security.

    Managing Online Annoyance (Malaware)

    • Adware presents unwanted advertisements
    • Spyware is a program that is secretly installed on a computer and reports back to the perpetrator on what is going on with the victim's computer.
    • Spam is unwanted email.
    • Spim is unwanted instant messaging.

    Backing Up Your Data

    • Data loss can be caused by unauthorized access, tampering, or malicious intent.
    • Different backup types exist (e.g., incremental, image backup).
    • Data backups (e.g., program files, data files) should be stored (e.g., online, external hard drive, network server).

    Social Engineering (Phishing and Pharming)

    • Social engineering uses social skills to trick people into revealing sensitive information. Phishing and Pharming are types of social engineering attacks.

    • Phishing lures victims into revealing sensitive information by pretending to be a legitimate entity.

    • Pharming redirects users to fraudulent websites that appear legit, used for information capture.

    Protecting Physical Computing Assets

    • Power surges can damage computer components; surge protectors should be used.
    • Theft prevention measures such as securing devices and using software to track stolen devices are essential.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on cybercrime, identity theft, and computer viruses. This quiz covers the main types of cybercrimes and the basics of hacking and viruses. Understand how these threats operate and what you can do to protect yourself.

    More Like This

    Technology in Action - Chapter 9
    40 questions
    Cybercrime and Identity Theft Overview
    10 questions
    Use Quizgecko on...
    Browser
    Browser