Podcast
Questions and Answers
What constitutes a cyber crime?
What constitutes a cyber crime?
Which definition best summarizes cyber crime?
Which definition best summarizes cyber crime?
What was one of the consequences of cyber crime mentioned in the content?
What was one of the consequences of cyber crime mentioned in the content?
Which of the following was NOT listed as a major cyber attack in 2017?
Which of the following was NOT listed as a major cyber attack in 2017?
Signup and view all the answers
What is the main motive typically associated with cyber crimes?
What is the main motive typically associated with cyber crimes?
Signup and view all the answers
What distinguishes the Dark Web from the Deep Web?
What distinguishes the Dark Web from the Deep Web?
Signup and view all the answers
Which of the following statements about the Surface Web is true?
Which of the following statements about the Surface Web is true?
Signup and view all the answers
What is the approximate cost of a U.S. credit card with track data on the Dark Web?
What is the approximate cost of a U.S. credit card with track data on the Dark Web?
Signup and view all the answers
Which activity is less common in the Deep Web compared to the Dark Web?
Which activity is less common in the Deep Web compared to the Dark Web?
Signup and view all the answers
Which of the following examples is categorized under the type of cyber crimes where computers are used to commit crime?
Which of the following examples is categorized under the type of cyber crimes where computers are used to commit crime?
Signup and view all the answers
How is the Deep Web primarily characterized?
How is the Deep Web primarily characterized?
Signup and view all the answers
What is the typical price range for hacking into a website on the Dark Web?
What is the typical price range for hacking into a website on the Dark Web?
Signup and view all the answers
Which of the following is NOT a characteristic of the Dark Web?
Which of the following is NOT a characteristic of the Dark Web?
Signup and view all the answers
What percentage of security safeguards relies on the computer user adhering to good practices?
What percentage of security safeguards relies on the computer user adhering to good practices?
Signup and view all the answers
What should you do to ensure your operating system and applications remain secure?
What should you do to ensure your operating system and applications remain secure?
Signup and view all the answers
Which of the following is a good practice for creating passwords?
Which of the following is a good practice for creating passwords?
Signup and view all the answers
Why should you avoid clicking on unknown links or attachments?
Why should you avoid clicking on unknown links or attachments?
Signup and view all the answers
What is a sign that a website is secure for entering sensitive information?
What is a sign that a website is secure for entering sensitive information?
Signup and view all the answers
What is one of the consequences of failing to adhere to security practices?
What is one of the consequences of failing to adhere to security practices?
Signup and view all the answers
How can you reduce the risk of data interception on wireless networks?
How can you reduce the risk of data interception on wireless networks?
Signup and view all the answers
What is the main responsibility of an individual using a computer regarding security?
What is the main responsibility of an individual using a computer regarding security?
Signup and view all the answers
What is the primary goal of hacking?
What is the primary goal of hacking?
Signup and view all the answers
Which of the following best defines theft of information?
Which of the following best defines theft of information?
Signup and view all the answers
Email bombing results in which of the following?
Email bombing results in which of the following?
Signup and view all the answers
What characterizes a Trojan Attack?
What characterizes a Trojan Attack?
Signup and view all the answers
What type of cyber attack involves small unauthorized deductions over time?
What type of cyber attack involves small unauthorized deductions over time?
Signup and view all the answers
How do worms differ from viruses?
How do worms differ from viruses?
Signup and view all the answers
What is the purpose of a Denial of Service (DoS) attack?
What is the purpose of a Denial of Service (DoS) attack?
Signup and view all the answers
Which of the following correctly describes a virus?
Which of the following correctly describes a virus?
Signup and view all the answers
What is the primary objective of Cyber-Terrorism?
What is the primary objective of Cyber-Terrorism?
Signup and view all the answers
Which aspect does NOT fall under the umbrella of Computer Security?
Which aspect does NOT fall under the umbrella of Computer Security?
Signup and view all the answers
What triggers a logic bomb to activate?
What triggers a logic bomb to activate?
Signup and view all the answers
What is a key reason for the importance of Computer Security?
What is a key reason for the importance of Computer Security?
Signup and view all the answers
Which of the following is NOT a common method of cyber-crime?
Which of the following is NOT a common method of cyber-crime?
Signup and view all the answers
What does the '90 / 10' Rule in computer security signify?
What does the '90 / 10' Rule in computer security signify?
Signup and view all the answers
Which of the following best describes Web Jacking?
Which of the following best describes Web Jacking?
Signup and view all the answers
What mechanism is NOT typically included in the processes of Computer Security?
What mechanism is NOT typically included in the processes of Computer Security?
Signup and view all the answers
Study Notes
Cybercrime Definition
- Cybercrime is any crime that involves a computer or mobile device and a network.
- Cybercrime can be committed using a computer or targeting a computer.
- Cybercrime can be defined as "Offences that are committed against individuals or groups with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as the Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)."
Classification of Cyber Crimes
- Cyber crimes can be categorized by how the computer is involved: either as a tool to commit the crime or as a target.
Computer Intrusions and Hacking
- Hacking is the illegal access to a computer system or network.
- Hacking can be used to commit various cyber crimes, including theft and terrorism.
Computer Security
- Computer security is the protection of computing systems and the data they store or access.
- Computer Security covers processes and mechanisms that protect computer-based equipment, information, and services from unauthorized access, change, or destruction.
- Computer security includes protection from unintended or unauthorized events and natural disasters.
Importance of Computer Security
- Computer security is essential for enabling job tasks, education, and research.
- Computer security supports critical business processes.
- Computer security protects personal and sensitive information.
90-10 Rule of Security
- The 90/10 Rule states that 10% of security safeguards are technical and 90% rely on user behavior.
- Example: A door lock provides technical security, but user habits like locking it, checking if it's closed, and keeping the keys secure are crucial for effective security.
- Everyone using a computer needs to understand and practice good security habits.
Consequence of Security Violations
- Security violations can lead to compromised personal or confidential information.
- Potential risks include identity theft, data corruption or destruction, and unavailability of critical information in emergencies.
Simple Security Measures
- Use strong and unique passwords that are difficult to guess.
- Keep passwords secret.
- Update operating systems and applications with necessary security patches.
- Use up-to-date antivirus and anti-spyware software.
- Avoid clicking on unknown or unsolicited links or attachments.
- Do not download unknown files or programs.
- Use HTTPS connections and look for the padlock symbol in the URL bar when entering sensitive information or passwords.
Biggest Cyber Attacks of 2017
- Equifax Data Breach – 145.5 Million Accounts
- Uber Data Breach – 57 Million Records
- WannaCry Cyber Attack – 300,000 Systems
- Yahoo! Makes History, Again – 3 Billion Accounts
- Deep Root Analytics Data Breach – 198 Million U.S. Voters
- Rasputin Attacks – 60 Universities and Federal Agencies
Dark Web vs Deep Web vs Surface Web
- Surface Web: Indexed by search engines, minimal illegal activity.
- Deep Web: Not indexed by search engines, little illegal activity outside of the Dark Web, large and growing.
- Dark Web: Restricted to special browsers, not indexed by search engines, significant illegal activity, accessed with passwords, encryption, or gateway software.
Cost of Information on the Dark Web
- Bank credential: $1,000 plus (6% of the total account balance)
- U.S. credit card with track data: $12
- EU, Asia credit card with track data: $28
- Hacking into a website: $100 to $300
- Counterfeit social security cards: $250 to $400
- Counterfeit driver's license: $100 to $150
Examples of Cyber Crimes where Computers are Tools
- Threatening emails
- Identity theft
- Defamation
- SPAM and Phishing
Examples of Cyber Crimes where Computers are Targets
- Viruses
- Worms
- Industrial espionage
- Software piracy
- Hacking
Specific Examples of Cybercrimes
- Theft of Information: Includes stealing data from computer hard disks or removable storage media, potentially leading to identify theft.
- Email Bombing: Involves sending massive amounts of email to a victim, causing the email account or server to crash.
- Salami Attacks: Financial crime where a small amount of money is deducted over time from multiple accounts, going unnoticed by the account holder.
- Denial of Service (DoS) Attack: Overloads a computer resource with requests, causing it to crash and deny service to authorized users.
- Virus: A program that attaches to a computer or file and replicates, often affecting data by altering or deleting it.
- Logic Bombs: Programs that activate only when a specific event occurs, such as a specific date.
- Trojan Attacks: Unauthorized programs disguised as authorized software, concealing their true purpose.
- Worm: Self-replicating programs that spread without needing a host file (unlike viruses), consuming memory and causing system problems.
- Web Jacking: The forceful taking control of a website by cracking passwords.
- Cyber-Terrorism: Hacking designed to instill terror, using similar tactics to conventional terrorism.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the definition of cybercrime, including its various forms and how computers can either be tools or targets in these crimes. It also addresses hacking and computer security essentials. Test your knowledge on the impact of cybercrime on individuals and organizations.