Cybercrime and Computer Security
28 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of backup only saves the files that have changed since the last backup?

  • Incremental backup (correct)
  • Full backup
  • Image backup
  • Differential backup

Which situation is least likely to fall under unauthorized access?

  • A hacker breaking into a secured server
  • An employee sharing their password with a colleague
  • A user accessing their own account from a public computer (correct)
  • A phishing attempt targeting sensitive information

What is the primary purpose of a surge protector?

  • To filter out internet traffic
  • To prevent power surges from damaging devices (correct)
  • To boost the performance of electronics
  • To store backup files in case of power failure

What is the method known as 'social engineering' primarily aimed at?

<p>Convincing individuals to divulge confidential information (B)</p> Signup and view all the answers

Which of the following is NOT a characteristic of scareware?

<p>It enhances the computer's security features (D)</p> Signup and view all the answers

Which storage option is generally considered the most secure for backing up sensitive files?

<p>Online cloud storage (A)</p> Signup and view all the answers

In the context of theft prevention, what does encryption software do?

<p>Make data unreadable without a proper password (A)</p> Signup and view all the answers

What is pharming primarily intended to achieve?

<p>To manipulate users into entering sensitive information on counterfeit websites (D)</p> Signup and view all the answers

What is the main purpose of a computer virus?

<p>To steal and damage data (C)</p> Signup and view all the answers

Which category of virus is triggered by a specific date and time?

<p>Time bomb (D)</p> Signup and view all the answers

What distinguishes worms from other types of viruses?

<p>Worms do not require human interaction to spread (D)</p> Signup and view all the answers

Which type of hacker legally breaks into systems to report vulnerabilities?

<p>White-hat hacker (D)</p> Signup and view all the answers

What classification of viruses periodically changes their code to avoid detection?

<p>Polymorphic viruses (D)</p> Signup and view all the answers

Which of the following is a characteristic of an email virus?

<p>Uses the victim's address book to spread (B)</p> Signup and view all the answers

What is the first step in preventing virus infections?

<p>Keeping antivirus software up to date (B)</p> Signup and view all the answers

What defines a black-hat hacker?

<p>Individuals who illegally break in for financial gain (A)</p> Signup and view all the answers

Which type of virus is activated by specific logic conditions?

<p>Logic bomb virus (B)</p> Signup and view all the answers

What is the main function of antivirus software?

<p>To detect and protect against viruses (D)</p> Signup and view all the answers

What is a primary function of a Trojan horse in the context of computer security?

<p>To install backdoor programs/rootkits (A)</p> Signup and view all the answers

What describes a zombie computer in cybersecurity?

<p>A computer controllable by a hacker (B)</p> Signup and view all the answers

How do distributed denial-of-service (DDoS) attacks typically operate?

<p>By using multiple computers as zombies (B)</p> Signup and view all the answers

What type of ports can be manually closed using a firewall?

<p>Logical ports (D)</p> Signup and view all the answers

Which of the following biometric authentication methods provides a unique measure based on physical traits?

<p>Voice recognition (C)</p> Signup and view all the answers

Which type of spyware is designed to monitor and log keystrokes?

<p>Keystroke logger program (C)</p> Signup and view all the answers

What is the main purpose of a spam filter?

<p>To identify and block unwanted emails (A)</p> Signup and view all the answers

Which option is not a legitimate tactic to minimize spam?

<p>Ignore all incoming messages (A)</p> Signup and view all the answers

What is a function of Windows Defender in relation to spyware?

<p>It scans for spyware (D)</p> Signup and view all the answers

What is the consequence of a denial-of-service attack?

<p>Legitimate users are denied access (A)</p> Signup and view all the answers

Flashcards

What is Cybercrime?

Any criminal activity primarily committed using a computer, networks, and the internet.

What is the main purpose of computer viruses?

To steal information or cause damage to a computer system.

How do most computer viruses spread?

They require human interaction, like opening an infected email attachment or downloading a corrupted file.

What is a Boot-Sector Virus?

A type of virus that replicates itself onto the boot sector of a drive and executes when the computer starts up.

Signup and view all the flashcards

What is a Logic Bomb Virus?

A virus that is triggered when a specific condition is met, like opening a file a certain number of times.

Signup and view all the flashcards

What is a Time Bomb Virus?

A virus that is activated on a specific date and time.

Signup and view all the flashcards

What is a Worm?

A type of virus that spreads itself without human interaction, using methods like email or network connections.

Signup and view all the flashcards

What is an Email Virus?

A virus that uses the victim's contact list to spread itself, often by attaching itself to emails.

Signup and view all the flashcards

What is an Encryption Virus (Ransomware)?

A type of virus that encrypts files, making them unusable, and demands payment for decryption.

Signup and view all the flashcards

What is a White-Hat Hacker?

A hacker who finds security flaws to help fix them, often for money.

Signup and view all the flashcards

Unauthorized Access

Someone gaining access to your computer or data without permission.

Signup and view all the flashcards

Trojan Horse

A program disguised as something useful that secretly installs backdoor programs or rootkits, giving a hacker control over your computer.

Signup and view all the flashcards

Data Tampering

Accidental or intentional changes made to your data.

Signup and view all the flashcards

Rootkit

A type of malware that hides itself and allows a hacker to take control of your computer, giving them access to your files and data without your knowledge.

Signup and view all the flashcards

Data Destruction

Losing your data permanently due to accidents or disasters.

Signup and view all the flashcards

Zombie

A computer controlled by a hacker without the owner's knowledge, often used to launch denial-of-service attacks.

Signup and view all the flashcards

Denial-of-Service (DoS) Attack

An attack that overloads a computer system with requests, making it unavailable to legitimate users.

Signup and view all the flashcards

Incremental Backup

A backup that only copies files that have changed since the last backup.

Signup and view all the flashcards

System Image Backup

A complete snapshot of your computer, including the operating system and all files.

Signup and view all the flashcards

Distributed Denial-of-Service (DDoS) Attack

A type of DoS attack where multiple computers (zombies) are used to overload a target system.

Signup and view all the flashcards

Logical Port

A virtual communication gateway allowing a computer to receive and send requests for information, such as emails or web pages.

Signup and view all the flashcards

Social Engineering

Using psychology and manipulation to trick people into revealing sensitive information.

Signup and view all the flashcards

Phishing

A type of social engineering that uses fake emails or websites to steal your personal information.

Signup and view all the flashcards

Physical Port

A physical connection point on a computer, like a USB port, that allows for data exchange.

Signup and view all the flashcards

Pharming

Malicious code that redirects you to fake websites to steal your information.

Signup and view all the flashcards

Firewall

Hardware or software that protects your computer by blocking unwanted connections and preventing unauthorized access to your data.

Signup and view all the flashcards

Password Strength Test

A tool that assesses the security of your password based on its length, complexity, and common patterns.

Signup and view all the flashcards

Biometric Authentication

Using unique biological characteristics like fingerprints or iris patterns to verify identity.

Signup and view all the flashcards

Study Notes

Cybercrime and Identity Theft

  • Cybercrime is any criminal act primarily performed through a computer.
  • Cybercriminals use computers, networks, and the internet to commit crimes.
  • Common types of cybercrimes include FBI impersonation, identity theft (stealing bank data), non-delivery scams (selling nonexistent items), and advanced fee fraud (demanding upfront payments).

Hacking

  • Hacking involves unauthorized computer access.

Computer Viruses

  • Viruses are computer programs that attach themselves to other programs.
  • Viruses can infect smartphones and tablets, as well as traditional computers.
  • Viruses require user interaction to spread.
  • The primary purpose of a virus is to steal or damage data and cause harm.
  • Viruses may also have secondary objectives such as network disruptions or data breaches.
  • Ways to become infected include downloading files from untrustworthy websites or opening email attachments from unknown sources.

Major Virus Categories

  • Boot-sector viruses: These viruses replicate onto a hard drive's boot sector and execute during system start-up. They load into memory before the antivirus runs.
  • Logic bomb viruses: These viruses are triggered when specific conditions, such as a certain date or file opening, are met.
  • Time bomb viruses: These viruses activate on a set date and time.
  • Worms: Worms are self-replicating programs that spread independently without user interaction. They spread using various methods, like email attachments or network connections. They are more active in spreading compared to viruses.
  • Email viruses: These spread via email attachments.
  • Encryption viruses (ransomware): Encryption viruses encrypt files and demand payment to unlock them.

Viruses Classification

  • Some viruses disguise their activities, utilizing particular methods to avoid detection:
  • Polymorphic viruses: These viruses change their code periodically to avoid detection by antivirus software.
  • Multipartite viruses: These viruses affect different file types in attempts to bypass detection methods.
  • Stealth viruses: These viruses hide in active memory when the hard drive is scanned, thus evading detection.

Preventing Virus Infections

  • Antivirus software is crucial for detecting and protecting computers from viruses.
  • Antivirus software should be kept up to date.

Understanding Hackers

  • Hackers are individuals who gain unauthorized access to computers.
  • Hackers are categorized by their motives: white-hat hackers (ethical hackers), black-hat hackers (those who gain illegal access), and grey-hat hackers.
  • Trojan horses and rootkits are malicious programs that appear to be legitimate for gaining access without the user's knowledge.

Denial-of-Service Attacks

  • Denial-of-service attacks use numerous compromised computers (zombies) to overwhelm a system or network with requests, leading to its shutdown and denial of legitimate use.

Restricting Access to Digital Assets

  • Firewalls are hardware or software that block access to specific network ports, preventing unwanted access.
  • Passwords should be strong to defend against unauthorized access.
  • Biometric authentication methods (e.g., fingerprint, iris recognition) enhance security.

Managing Online Annoyance (Malaware)

  • Adware presents unwanted advertisements
  • Spyware is a program that is secretly installed on a computer and reports back to the perpetrator on what is going on with the victim's computer.
  • Spam is unwanted email.
  • Spim is unwanted instant messaging.

Backing Up Your Data

  • Data loss can be caused by unauthorized access, tampering, or malicious intent.
  • Different backup types exist (e.g., incremental, image backup).
  • Data backups (e.g., program files, data files) should be stored (e.g., online, external hard drive, network server).

Social Engineering (Phishing and Pharming)

  • Social engineering uses social skills to trick people into revealing sensitive information. Phishing and Pharming are types of social engineering attacks.

  • Phishing lures victims into revealing sensitive information by pretending to be a legitimate entity.

  • Pharming redirects users to fraudulent websites that appear legit, used for information capture.

Protecting Physical Computing Assets

  • Power surges can damage computer components; surge protectors should be used.
  • Theft prevention measures such as securing devices and using software to track stolen devices are essential.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your knowledge on cybercrime, identity theft, and computer viruses. This quiz covers the main types of cybercrimes and the basics of hacking and viruses. Understand how these threats operate and what you can do to protect yourself.

More Like This

Cybercrime Overview Quiz
40 questions

Cybercrime Overview Quiz

LovedVirginiaBeach avatar
LovedVirginiaBeach
Technology in Action - Chapter 9
38 questions
Cybercrime and Identity Theft Overview
10 questions
Use Quizgecko on...
Browser
Browser