Cybercrime Overview and Classification
37 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What constitutes a cyber crime?

  • Any crime involving the use of a computer or network. (correct)
  • Crimes that only target physical property.
  • Offenses committed solely through face-to-face interaction.
  • Cyber crimes that are not reported to law enforcement.
  • Which definition best summarizes cyber crime?

  • Acts that are legal in traditional contexts but illegal online.
  • Unlawful acts where a computer is either a tool or a target. (correct)
  • Cyber crimes that exclusively involve social media platforms.
  • Criminal acts that primarily aim to steal physical goods.
  • What was one of the consequences of cyber crime mentioned in the content?

  • Threatening national security and financial stability. (correct)
  • Boosting online commerce through internet exploitation.
  • Enhancing personal privacy settings.
  • Improving computer security protocols.
  • Which of the following was NOT listed as a major cyber attack in 2017?

    <p>Target Security Breach.</p> Signup and view all the answers

    What is the main motive typically associated with cyber crimes?

    <p>Criminal intent to harm or exploit.</p> Signup and view all the answers

    What distinguishes the Dark Web from the Deep Web?

    <p>The Dark Web involves large-scale illegal activities.</p> Signup and view all the answers

    Which of the following statements about the Surface Web is true?

    <p>The Surface Web is relatively small in size and involves little illegal activity.</p> Signup and view all the answers

    What is the approximate cost of a U.S. credit card with track data on the Dark Web?

    <p>$12</p> Signup and view all the answers

    Which activity is less common in the Deep Web compared to the Dark Web?

    <p>Involvement in illegal activities.</p> Signup and view all the answers

    Which of the following examples is categorized under the type of cyber crimes where computers are used to commit crime?

    <p>Spamming emails.</p> Signup and view all the answers

    How is the Deep Web primarily characterized?

    <p>Larger in size and growing exponentially.</p> Signup and view all the answers

    What is the typical price range for hacking into a website on the Dark Web?

    <p>$100 to $300</p> Signup and view all the answers

    Which of the following is NOT a characteristic of the Dark Web?

    <p>Offers access to legal content.</p> Signup and view all the answers

    What percentage of security safeguards relies on the computer user adhering to good practices?

    <p>90%</p> Signup and view all the answers

    What should you do to ensure your operating system and applications remain secure?

    <p>Install all necessary security patches and updates</p> Signup and view all the answers

    Which of the following is a good practice for creating passwords?

    <p>Use good, cryptic passwords that are hard to guess</p> Signup and view all the answers

    Why should you avoid clicking on unknown links or attachments?

    <p>They may contain malware or phishing attempts</p> Signup and view all the answers

    What is a sign that a website is secure for entering sensitive information?

    <p>The presence of 'https' and a padlock symbol</p> Signup and view all the answers

    What is one of the consequences of failing to adhere to security practices?

    <p>Potential identity theft</p> Signup and view all the answers

    How can you reduce the risk of data interception on wireless networks?

    <p>Looking for 'https' and a padlock before transmitting sensitive information</p> Signup and view all the answers

    What is the main responsibility of an individual using a computer regarding security?

    <p>Understand and practice good computing habits</p> Signup and view all the answers

    What is the primary goal of hacking?

    <p>To gain unauthorized access to computer systems</p> Signup and view all the answers

    Which of the following best defines theft of information?

    <p>Stealing electronic information such as identity theft</p> Signup and view all the answers

    Email bombing results in which of the following?

    <p>Crashing of mail servers or email accounts</p> Signup and view all the answers

    What characterizes a Trojan Attack?

    <p>It conceals its actions by functioning inside an authorized program.</p> Signup and view all the answers

    What type of cyber attack involves small unauthorized deductions over time?

    <p>Salami attack</p> Signup and view all the answers

    How do worms differ from viruses?

    <p>Worms replicate actively and consume system memory.</p> Signup and view all the answers

    What is the purpose of a Denial of Service (DoS) attack?

    <p>To overload resources and crash servers</p> Signup and view all the answers

    Which of the following correctly describes a virus?

    <p>A program that attaches itself to files and spreads to other systems</p> Signup and view all the answers

    What is the primary objective of Cyber-Terrorism?

    <p>To generate fear or cause violence against individuals or property.</p> Signup and view all the answers

    Which aspect does NOT fall under the umbrella of Computer Security?

    <p>Preventing natural disasters.</p> Signup and view all the answers

    What triggers a logic bomb to activate?

    <p>A scheduled time or event</p> Signup and view all the answers

    What is a key reason for the importance of Computer Security?

    <p>To support critical business processes.</p> Signup and view all the answers

    Which of the following is NOT a common method of cyber-crime?

    <p>Internet browsing</p> Signup and view all the answers

    What does the '90 / 10' Rule in computer security signify?

    <p>10% of safeguards are technical measures.</p> Signup and view all the answers

    Which of the following best describes Web Jacking?

    <p>Taking control of a website through hacking.</p> Signup and view all the answers

    What mechanism is NOT typically included in the processes of Computer Security?

    <p>Increasing hardware performance.</p> Signup and view all the answers

    Study Notes

    Cybercrime Definition

    • Cybercrime is any crime that involves a computer or mobile device and a network.
    • Cybercrime can be committed using a computer or targeting a computer.
    • Cybercrime can be defined as "Offences that are committed against individuals or groups with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as the Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)."

    Classification of Cyber Crimes

    • Cyber crimes can be categorized by how the computer is involved: either as a tool to commit the crime or as a target.

    Computer Intrusions and Hacking

    • Hacking is the illegal access to a computer system or network.
    • Hacking can be used to commit various cyber crimes, including theft and terrorism.

    Computer Security

    • Computer security is the protection of computing systems and the data they store or access.
    • Computer Security covers processes and mechanisms that protect computer-based equipment, information, and services from unauthorized access, change, or destruction.
    • Computer security includes protection from unintended or unauthorized events and natural disasters.

    Importance of Computer Security

    • Computer security is essential for enabling job tasks, education, and research.
    • Computer security supports critical business processes.
    • Computer security protects personal and sensitive information.

    90-10 Rule of Security

    • The 90/10 Rule states that 10% of security safeguards are technical and 90% rely on user behavior.
    • Example: A door lock provides technical security, but user habits like locking it, checking if it's closed, and keeping the keys secure are crucial for effective security.
    • Everyone using a computer needs to understand and practice good security habits.

    Consequence of Security Violations

    • Security violations can lead to compromised personal or confidential information.
    • Potential risks include identity theft, data corruption or destruction, and unavailability of critical information in emergencies.

    Simple Security Measures

    • Use strong and unique passwords that are difficult to guess.
    • Keep passwords secret.
    • Update operating systems and applications with necessary security patches.
    • Use up-to-date antivirus and anti-spyware software.
    • Avoid clicking on unknown or unsolicited links or attachments.
    • Do not download unknown files or programs.
    • Use HTTPS connections and look for the padlock symbol in the URL bar when entering sensitive information or passwords.

    Biggest Cyber Attacks of 2017

    • Equifax Data Breach – 145.5 Million Accounts
    • Uber Data Breach – 57 Million Records
    • WannaCry Cyber Attack – 300,000 Systems
    • Yahoo! Makes History, Again – 3 Billion Accounts
    • Deep Root Analytics Data Breach – 198 Million U.S. Voters
    • Rasputin Attacks – 60 Universities and Federal Agencies

    Dark Web vs Deep Web vs Surface Web

    • Surface Web: Indexed by search engines, minimal illegal activity.
    • Deep Web: Not indexed by search engines, little illegal activity outside of the Dark Web, large and growing.
    • Dark Web: Restricted to special browsers, not indexed by search engines, significant illegal activity, accessed with passwords, encryption, or gateway software.

    Cost of Information on the Dark Web

    • Bank credential: $1,000 plus (6% of the total account balance)
    • U.S. credit card with track data: $12
    • EU, Asia credit card with track data: $28
    • Hacking into a website: $100 to $300
    • Counterfeit social security cards: $250 to $400
    • Counterfeit driver's license: $100 to $150

    Examples of Cyber Crimes where Computers are Tools

    • Threatening emails
    • Identity theft
    • Defamation
    • SPAM and Phishing

    Examples of Cyber Crimes where Computers are Targets

    • Viruses
    • Worms
    • Industrial espionage
    • Software piracy
    • Hacking

    Specific Examples of Cybercrimes

    • Theft of Information: Includes stealing data from computer hard disks or removable storage media, potentially leading to identify theft.
    • Email Bombing: Involves sending massive amounts of email to a victim, causing the email account or server to crash.
    • Salami Attacks: Financial crime where a small amount of money is deducted over time from multiple accounts, going unnoticed by the account holder.
    • Denial of Service (DoS) Attack: Overloads a computer resource with requests, causing it to crash and deny service to authorized users.
    • Virus: A program that attaches to a computer or file and replicates, often affecting data by altering or deleting it.
    • Logic Bombs: Programs that activate only when a specific event occurs, such as a specific date.
    • Trojan Attacks: Unauthorized programs disguised as authorized software, concealing their true purpose.
    • Worm: Self-replicating programs that spread without needing a host file (unlike viruses), consuming memory and causing system problems.
    • Web Jacking: The forceful taking control of a website by cracking passwords.
    • Cyber-Terrorism: Hacking designed to instill terror, using similar tactics to conventional terrorism.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    L31-CyberSecurity PDF

    Description

    This quiz covers the definition of cybercrime, including its various forms and how computers can either be tools or targets in these crimes. It also addresses hacking and computer security essentials. Test your knowledge on the impact of cybercrime on individuals and organizations.

    More Like This

    Computer Hacking and Cybercrimes
    10 questions
    Computer Criminal Categories
    18 questions

    Computer Criminal Categories

    EnergyEfficientApostrophe avatar
    EnergyEfficientApostrophe
    Cyber Crime and Hacking
    12 questions
    Cybercrimes Lesson 2
    8 questions

    Cybercrimes Lesson 2

    ThinnerFable6768 avatar
    ThinnerFable6768
    Use Quizgecko on...
    Browser
    Browser