Cybercrime and Economy
43 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the estimated annual cost of cybercrime to the global economy according to Intel Security (2014)?

> USD400 Billion

What is the projected cost of cybercrime by 2019 according to Forbes (2016)?

USD2-Trillion

What is the concept that explains why cybercriminals often target easy and lucrative targets?

Low-hanging fruit

According to Prothero's theory, what happens when convenience overtakes concerns or problems?

<p>Convenience overshoot</p> Signup and view all the answers

Why are internet and associated technologies vulnerable to cybercrime?

<p>They were not designed with security in mind</p> Signup and view all the answers

What is the estimated cost of cybercrime in 2019 according to Statista?

<p>USD1.16 Trillion</p> Signup and view all the answers

What is the main purpose of Samba?

<p>To address the issue of interoperability</p> Signup and view all the answers

What is the purpose of tools like chkrootkit?

<p>To detect rootkits on Linux systems</p> Signup and view all the answers

Why is it nearly impossible to write a bug-free program?

<p>Because it is difficult to anticipate and test every possible scenario</p> Signup and view all the answers

What is the main difference between static and dynamic web pages?

<p>The information presented varies with time or user for dynamic web pages</p> Signup and view all the answers

What is the purpose of the Common Gateway Interface (CGI)?

<p>To enable dynamic web pages</p> Signup and view all the answers

What is the main advantage of using PHP?

<p>It enables the creation of dynamic web pages</p> Signup and view all the answers

What is the purpose of ODBC?

<p>To provide a standard method for accessing databases</p> Signup and view all the answers

What is the main advantage of using ActiveX Data Objects (ADO)?

<p>It provides a faster, more efficient, and more stable way of accessing databases</p> Signup and view all the answers

What is the main goal of the Open Web Application Security Project (OWASP)?

<p>To find and fight web application vulnerabilities</p> Signup and view all the answers

What is the main purpose of the OWASP WebGoat project?

<p>To help security testers learn how to conduct vulnerability testing on web applications</p> Signup and view all the answers

What can be determined with just a URL?

<p>Web server OS and names of IT personnel.</p> Signup and view all the answers

What is a cookie?

<p>A text file generated by a Web server, stored on a user’s browser, and sending information back to the Web server when the user returns.</p> Signup and view all the answers

What is a web bug?

<p>A one-pixel by one-pixel image file referenced in an img tag, usually working with a cookie, and similar to spyware and adware.</p> Signup and view all the answers

What is social engineering?

<p>Targeting the human component of a network to obtain confidential information or personal information.</p> Signup and view all the answers

What is port scanning?

<p>Identifying which services are offered by a host and finding vulnerabilities, and identifying the operating system.</p> Signup and view all the answers

What is footprinting?

<p>Gathering network information using web tools, such as IP addresses and domain names.</p> Signup and view all the answers

What is enumeration?

<p>Extracting information about resources or shares on the network, usernames or groups assigned on the network, and user passwords and recent logon times.</p> Signup and view all the answers

What is the main weakness in FAT file system?

<p>It does not support file-level access control lists (ACLs), making it vulnerable in a multiuser environment.</p> Signup and view all the answers

What is SQL Server vulnerability?

<p>Null System Administrator (SA) password, which gives attackers administrative access to the database.</p> Signup and view all the answers

What is the importance of patching systems?

<p>It is the best way to keep systems secure, as_patchin_ystems helps to eliminate known vulnerabilities that attackers can exploit.</p> Signup and view all the answers

What is the main security weakness in any network?

<p>Authorized users, as they can be manipulated and exploited by attackers.</p> Signup and view all the answers

What is the primary function of an Access Point (AP) in a wireless network?

<p>To connect to a network via an Ethernet cable and bridge a wireless LAN (WLAN) with a wired network</p> Signup and view all the answers

What is the purpose of a Service Set Identifier (SSID) in a wireless network?

<p>To identify a wireless local area network (WLAN) and enable users to connect to a LAN</p> Signup and view all the answers

What is the difference between WEP and WPA in wireless network security?

<p>WEP is a weaker encryption standard that encrypts data traversing a wireless network, while WPA is a stronger encryption standard that improves upon WEP's security features</p> Signup and view all the answers

What is the purpose of the 802.1X standard in wireless networks?

<p>To define the process of authenticating and authorizing users on a WLAN</p> Signup and view all the answers

What is wardriving, and what tools are typically used in the process?

<p>Wardriving is the act of driving around with inexpensive hardware and software to detect unsecured APs, and commonly used tools include a laptop, WNIC, antenna, and software such as NetStumbler or Kismet</p> Signup and view all the answers

What is the main purpose of the IEEE in relation to wireless networks?

<p>To create standards for LANs and WANs, including the 802.11 standard for wireless networking</p> Signup and view all the answers

What is the function of a Wireless Network Interface Card (WNIC) in a wireless network?

<p>To convert radio waves into digital signals and enable wireless communication</p> Signup and view all the answers

What is the primary concern with wireless networks in terms of security?

<p>The potential for unauthorized users to access resources on the network</p> Signup and view all the answers

What is the difference between a Basic Service Set (BSS) and a Distribution System (DS) in a wireless network?

<p>A BSS is a collection of devices that make up a WLAN, while a DS is an intermediate layer that connects two BSSs</p> Signup and view all the answers

What is the purpose of countermeasures for wireless attacks, such as anti-wardriving software and honeypots?

<p>To make it more difficult for hackers to discover and access a WLAN, and to prevent unauthorized access to the network</p> Signup and view all the answers

What is one way an attacker can launch a Unicode exploit on an IIS web server?

<p>Submitting a specially formatted URL to the attacked web server.</p> Signup and view all the answers

What is the purpose of checking for SQL injection vulnerabilities in a web application?

<p>To prevent an attacker from inserting SQL commands in a web application field to attack the system.</p> Signup and view all the answers

Why is it important to test a web application's authentication mechanism?

<p>To ensure that the web application correctly authenticates users and prevents unauthorized access.</p> Signup and view all the answers

What is a characteristic of dynamic web pages?

<p>They can create a secure environment.</p> Signup and view all the answers

What is one type of input that security testers should check for when testing for SQL injection vulnerabilities?

<p>Text with punctuation marks.</p> Signup and view all the answers

What is the purpose of checking if a web application connects to a back-end database server?

<p>To identify potential vulnerabilities in the database server that can be exploited by an attacker.</p> Signup and view all the answers

More Like This

Cybercrime Quiz
5 questions

Cybercrime Quiz

TruthfulParadise avatar
TruthfulParadise
Cybercrime and Economics
37 questions
Cybercrime and Digital Footprints Quiz
13 questions
Use Quizgecko on...
Browser
Browser