Cybercrime and Economy

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the estimated annual cost of cybercrime to the global economy according to Intel Security (2014)?

> USD400 Billion

What is the projected cost of cybercrime by 2019 according to Forbes (2016)?

USD2-Trillion

What is the concept that explains why cybercriminals often target easy and lucrative targets?

Low-hanging fruit

According to Prothero's theory, what happens when convenience overtakes concerns or problems?

<p>Convenience overshoot</p> Signup and view all the answers

Why are internet and associated technologies vulnerable to cybercrime?

<p>They were not designed with security in mind</p> Signup and view all the answers

What is the estimated cost of cybercrime in 2019 according to Statista?

<p>USD1.16 Trillion</p> Signup and view all the answers

What is the main purpose of Samba?

<p>To address the issue of interoperability</p> Signup and view all the answers

What is the purpose of tools like chkrootkit?

<p>To detect rootkits on Linux systems</p> Signup and view all the answers

Why is it nearly impossible to write a bug-free program?

<p>Because it is difficult to anticipate and test every possible scenario</p> Signup and view all the answers

What is the main difference between static and dynamic web pages?

<p>The information presented varies with time or user for dynamic web pages</p> Signup and view all the answers

What is the purpose of the Common Gateway Interface (CGI)?

<p>To enable dynamic web pages</p> Signup and view all the answers

What is the main advantage of using PHP?

<p>It enables the creation of dynamic web pages</p> Signup and view all the answers

What is the purpose of ODBC?

<p>To provide a standard method for accessing databases</p> Signup and view all the answers

What is the main advantage of using ActiveX Data Objects (ADO)?

<p>It provides a faster, more efficient, and more stable way of accessing databases</p> Signup and view all the answers

What is the main goal of the Open Web Application Security Project (OWASP)?

<p>To find and fight web application vulnerabilities</p> Signup and view all the answers

What is the main purpose of the OWASP WebGoat project?

<p>To help security testers learn how to conduct vulnerability testing on web applications</p> Signup and view all the answers

What can be determined with just a URL?

<p>Web server OS and names of IT personnel.</p> Signup and view all the answers

What is a cookie?

<p>A text file generated by a Web server, stored on a user’s browser, and sending information back to the Web server when the user returns.</p> Signup and view all the answers

What is a web bug?

<p>A one-pixel by one-pixel image file referenced in an img tag, usually working with a cookie, and similar to spyware and adware.</p> Signup and view all the answers

What is social engineering?

<p>Targeting the human component of a network to obtain confidential information or personal information.</p> Signup and view all the answers

What is port scanning?

<p>Identifying which services are offered by a host and finding vulnerabilities, and identifying the operating system.</p> Signup and view all the answers

What is footprinting?

<p>Gathering network information using web tools, such as IP addresses and domain names.</p> Signup and view all the answers

What is enumeration?

<p>Extracting information about resources or shares on the network, usernames or groups assigned on the network, and user passwords and recent logon times.</p> Signup and view all the answers

What is the main weakness in FAT file system?

<p>It does not support file-level access control lists (ACLs), making it vulnerable in a multiuser environment.</p> Signup and view all the answers

What is SQL Server vulnerability?

<p>Null System Administrator (SA) password, which gives attackers administrative access to the database.</p> Signup and view all the answers

What is the importance of patching systems?

<p>It is the best way to keep systems secure, as_patchin_ystems helps to eliminate known vulnerabilities that attackers can exploit.</p> Signup and view all the answers

What is the main security weakness in any network?

<p>Authorized users, as they can be manipulated and exploited by attackers.</p> Signup and view all the answers

What is the primary function of an Access Point (AP) in a wireless network?

<p>To connect to a network via an Ethernet cable and bridge a wireless LAN (WLAN) with a wired network</p> Signup and view all the answers

What is the purpose of a Service Set Identifier (SSID) in a wireless network?

<p>To identify a wireless local area network (WLAN) and enable users to connect to a LAN</p> Signup and view all the answers

What is the difference between WEP and WPA in wireless network security?

<p>WEP is a weaker encryption standard that encrypts data traversing a wireless network, while WPA is a stronger encryption standard that improves upon WEP's security features</p> Signup and view all the answers

What is the purpose of the 802.1X standard in wireless networks?

<p>To define the process of authenticating and authorizing users on a WLAN</p> Signup and view all the answers

What is wardriving, and what tools are typically used in the process?

<p>Wardriving is the act of driving around with inexpensive hardware and software to detect unsecured APs, and commonly used tools include a laptop, WNIC, antenna, and software such as NetStumbler or Kismet</p> Signup and view all the answers

What is the main purpose of the IEEE in relation to wireless networks?

<p>To create standards for LANs and WANs, including the 802.11 standard for wireless networking</p> Signup and view all the answers

What is the function of a Wireless Network Interface Card (WNIC) in a wireless network?

<p>To convert radio waves into digital signals and enable wireless communication</p> Signup and view all the answers

What is the primary concern with wireless networks in terms of security?

<p>The potential for unauthorized users to access resources on the network</p> Signup and view all the answers

What is the difference between a Basic Service Set (BSS) and a Distribution System (DS) in a wireless network?

<p>A BSS is a collection of devices that make up a WLAN, while a DS is an intermediate layer that connects two BSSs</p> Signup and view all the answers

What is the purpose of countermeasures for wireless attacks, such as anti-wardriving software and honeypots?

<p>To make it more difficult for hackers to discover and access a WLAN, and to prevent unauthorized access to the network</p> Signup and view all the answers

What is one way an attacker can launch a Unicode exploit on an IIS web server?

<p>Submitting a specially formatted URL to the attacked web server.</p> Signup and view all the answers

What is the purpose of checking for SQL injection vulnerabilities in a web application?

<p>To prevent an attacker from inserting SQL commands in a web application field to attack the system.</p> Signup and view all the answers

Why is it important to test a web application's authentication mechanism?

<p>To ensure that the web application correctly authenticates users and prevents unauthorized access.</p> Signup and view all the answers

What is a characteristic of dynamic web pages?

<p>They can create a secure environment.</p> Signup and view all the answers

What is one type of input that security testers should check for when testing for SQL injection vulnerabilities?

<p>Text with punctuation marks.</p> Signup and view all the answers

What is the purpose of checking if a web application connects to a back-end database server?

<p>To identify potential vulnerabilities in the database server that can be exploited by an attacker.</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser