Cybercrime and Cyber Criminals

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

A ______ attack is a type of social engineering where attackers deceive people into revealing sensitive information.

phishing

Cyber threat ______ provides organizations with a deeper understanding of external threats.

intelligence

A ______ attack is a type of phishing that targets specific individuals or organizations.

spear phishing

Cybercrime can pose a ______ threat to individuals, organizations, and society as a whole.

<p>significant</p> Signup and view all the answers

[Blank] is the act of sending fraudulent text messages to trick individuals into sharing sensitive data.

<p>Smishing</p> Signup and view all the answers

Using weak passwords or failing to update software are indicators of a lack of ______ when it comes to cyber security.

<p>awareness</p> Signup and view all the answers

[Blank] is a fraudulent Wi-Fi access point that appears legitimate but is set up to intercept wireless communications.

<p>Evil twin</p> Signup and view all the answers

Implementing robust cybersecurity measures and raising awareness are important steps to prevent and combat ______.

<p>cybercrime</p> Signup and view all the answers

Cybercrime may be the result of individuals or organizations not taking adequate ______ measures.

<p>cybersecurity</p> Signup and view all the answers

[Blank] is a form of social engineering where attackers deceive people into revealing sensitive information.

<p>Phishing</p> Signup and view all the answers

[Blank] attack allows an attacker to guess credentials by using an automated process of trial and error.

<p>Brute force</p> Signup and view all the answers

The act of gaining access to a network, system, or application without permission is known as ______ access.

<p>unauthorized</p> Signup and view all the answers

A ______ attack floods a network with false requests to disrupt business operations.

<p>Denial-of-Service</p> Signup and view all the answers

A voice phishing attack, also know as ______, uses phone calls to trick individuals into revealing private information.

<p>vishing</p> Signup and view all the answers

Cybercriminals who engage in cybercrime may do so to signal some form of ______.

<p>protest</p> Signup and view all the answers

Cybercrime can result in the violation of individuals' privacy by stealing personal information, leading to ______ theft among other criminal activities.

<p>identity</p> Signup and view all the answers

One of the most common reasons for cybercrime is ______ gain.

<p>financial</p> Signup and view all the answers

A ______ attack redirects traffic from legitimate to false sites.

<p>site spoofing</p> Signup and view all the answers

Cybercrime may threaten a person, company or a nation's security and ______ health.

<p>financial</p> Signup and view all the answers

[Blank] is when someone uses the internet to stalk, harass, or make repeated threats.

<p>Cyberstalking</p> Signup and view all the answers

A ______ is achieved when a website is designed to look real in order to decieve you.

<p>website spoofing</p> Signup and view all the answers

Cybercriminals may engage in cybercrime simply for the ______ of it, without any specific financial or political motivations.

<p>thrill</p> Signup and view all the answers

Protecting networks, computers, programs and data is achieved with the body of technologies, processes and practices known as ______.

<p>cybersecurity</p> Signup and view all the answers

A ______ employees are the cause of several data breaches.

<p>rogue</p> Signup and view all the answers

An ______ attack targets senior or C-level executive employees.

<p>Whaling</p> Signup and view all the answers

The thief gains access to your device's communications when they carry out a ______ attack.

<p>ARP Spoofing</p> Signup and view all the answers

[Blank] is a term describing child predators deliberately manipulating children through online resources with the intention of sexual assaulting them.

<p>Cyber grooming</p> Signup and view all the answers

Address Resolution Protocol is also identified as ______ poisoning.

<p>ARP</p> Signup and view all the answers

One reason to alter source addresses of packets is to hide the ______ of an attack.

<p>Source</p> Signup and view all the answers

Disrupting critical infrastructure with government or military networks has implications for ______ threat.

<p>national security</p> Signup and view all the answers

The victim of a cyberattack may experience a ______ impact, including stress, anxiety, or depression.

<p>psychological</p> Signup and view all the answers

[Blank] is the act of disguising oneself as a known or trusted source.

<p>Spoofing</p> Signup and view all the answers

The spear phisher steals send ______ emails altered to appear legitimate contain links to unlock access to banking credentials, trade Secrets and personal information.

<p>malicious</p> Signup and view all the answers

An email attack that targets businesses by forging sender addresses is known as ______.

<p>email spoofing</p> Signup and view all the answers

The inability to authenticate to a website is known as ______ authentication.

<p>insufficient</p> Signup and view all the answers

Cyber attacks can be motivated by political or social ______.

<p>reasons</p> Signup and view all the answers

An individual may decide to target someone who they feel has wronged them in some way, such as an ex-employer or a former partner is a motivation to carry out a cyber attack for ______.

<p>revenge</p> Signup and view all the answers

Cybercrime can damage the ______ of individuals and organizations by publishing false information, defaming them online, or spreading rumors.

<p>reputation</p> Signup and view all the answers

Cybersecurity includes both cybersecurity and ______ security.

<p>physical</p> Signup and view all the answers

Cybercrime presents legal and law enforcement ______ when cybercrime, is often committed across international borders.

<p>challenges</p> Signup and view all the answers

Flashcards

What is Cybercrime?

Criminal activity using technology, mainly involving a computer and a network, as a tool or target.

Unauthorized Access

Gaining access to a network, system, or application without permission.

Social Engineer

A cybercriminal that fakes identity to request rich data information.

Brute Force Attack

Attack that allows guessing usernames, passwords, or keys through automated trial and error.

Signup and view all the flashcards

Spoofing

Cybercriminal disguises themselves as a known or trusted source.

Signup and view all the flashcards

Packet Spoofing

Altering packet source/destination addresses to hide the attack source.

Signup and view all the flashcards

Phishing

Attackers deceive people into revealing sensitive information or installing malware.

Signup and view all the flashcards

Spear Phishing

Phishing attacks targeting specific individuals or organizations.

Signup and view all the flashcards

Smishing

Fraudulent text messages tricking users into sharing sensitive information.

Signup and view all the flashcards

Denial-of-Service (DoS) Attack

Malicious attack that floods a network with false requests disrupting operations.

Signup and view all the flashcards

Evil Twin

Fraudulent Wi-Fi access point that appears legitimate, set up to eavesdrop on communications.

Signup and view all the flashcards

Cyberbullying

Bullying or harassing others online, particularly on social media.

Signup and view all the flashcards

Cyberstalking

Using the internet to stalk, harass, or make repeated threats.

Signup and view all the flashcards

Ransomware

Malicious software preventing access to files/systems until a ransom is paid.

Signup and view all the flashcards

Reasons for Cybercrime

Motivations for cybercrime including financial gain, political reasons, or revenge.

Signup and view all the flashcards

Implications of Cybercrime

Impacts of cybercrime including financial loss, privacy breach, or damaged reputation.

Signup and view all the flashcards

Cybersecurity

Protecting networks, computers, and data from attack, damage, or unauthorized access.

Signup and view all the flashcards

Study Notes

  • Cybercrime involves a computer and network as a medium or a target of criminal activity
  • Cybercrime poses a threat to individuals, organizations, and society
  • Prevention involves cybersecurity measures and awareness

Cybercrime

  • Involves a computer and a network
  • May threaten a person, company, or a nation's security and financial health
  • Unauthorized access is gaining access to a network, system, application, or resource without permission

Cyber Criminals: 5 Types

  • Social engineers fake identity to request data
  • Spear phishers send malicious emails with links to steal banking credentials, trade secrets and personal information
  • Hackers
  • Rogue employees
  • Ransom artists

Authentication Attacks

  • Brute Force: Allows guessing username, password, credit card number, or cryptographic key
  • Insufficient Authentication: Allows access to a website with sensitive content without proper authentication
  • Weak Password Recovery Validation: Allows illegal access and password recovery

Spoofing

  • Cybercriminal disguises themself as a known/trusted source to steal information, extort money, or install malware
  • Domain spoofing involves impersonating a known business with a fake website or email domain
  • Email spoofing targets businesses using emails with forged sender addresses to deliver malicious content
  • Address Resolution Protocol (ARP) spoofing/poisoning intercepts data by redirecting messages to the hacker
  • Packet spoofing alters packet addresses to hide the attack source or bypass security
  • Site spoofing redirects traffic from legitimate sites to false ones
  • Identity spoofing involves masquerading or impersonating another user

Phishing

  • Social engineering to deceive people into revealing information or installing malware with examples:
  • Phishing emails mimic trusted sources to trick people into giving information or clicking malicious links

Spear Phishing

  • A phishing attack that targets specific individuals or organizations to steal information or infect devices

Whaling Attack

  • Attacks senior executives to steal money/information or gain access to computers

Smishing

  • Sends fraudulent texts to trick people into sharing data like passwords and credit card numbers

Vishing

  • The fraudulent use of phone calls to trick people into revealing private information

Other Cybercrimes

  • Denial-of-Service (DoS) attacks flood a network with false requests
  • Evil twin is a fraudulent Wi-Fi access point
  • Cyberbullying: Bullying or harassing others online
  • Cyber grooming: Manipulating children online for sexual assault
  • Online predators: Individuals who commit child sexual abuse online
  • Cyberstalking: Stalking, harassing, or making threats online
  • Scam attacks: Include parcel, black money, love, investment, and Macau scams
  • Ransomware prevents users from accessing systems until a ransom is paid
  • Other attacks: Man-in-the-middle (MITM), SQL injection, zero-day exploits, tunneling, viruses, IoT hacking, and malware

Reasons for Cybercrime

  • Financial gain
  • Political or social reasons
  • Revenge
  • Thrill-seeking
  • Espionage
  • Lack of awareness
  • To get revenge or signal protest
  • To pursue illegal activity, steal identity, or forge documents

Implications of Cybercrime

  • Financial loss: Stolen money, credit card information, or intellectual property
  • Breach of privacy: Stolen personal information leads to identity theft and fraud
  • Reputation damage: Publishing false information or spreading rumors
  • Disruption of services: Impacting transportation, healthcare, and government services
  • National security threat: Compromising government and military networks
  • Psychological impact: Stress, anxiety, and depression
  • Legal and law enforcement challenges: Difficulty prosecuting crimes across borders

Guidelines for cybersecurity awareness

  • Cybersecurity protects networks, computers, programs, and data from attack
  • Cyber threat intelligence provides understanding of risks outside a network
  • Never give personal data over the phone or via email unless sure of security
  • Do not open attachments from unknown senders
  • Do not click links in spam emails or messages from unidentified sources
  • Check the authenticity of organizations involved
  • Use strong, unrecorded passwords
  • Update antivirus software and operating systems

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser