Podcast
Questions and Answers
What constitutes a cyber crime?
What constitutes a cyber crime?
- Any crime involving the use of a computer or network. (correct)
- Crimes that only target physical property.
- Offenses committed solely through face-to-face interaction.
- Cyber crimes that are not reported to law enforcement.
Which definition best summarizes cyber crime?
Which definition best summarizes cyber crime?
- Acts that are legal in traditional contexts but illegal online.
- Unlawful acts where a computer is either a tool or a target. (correct)
- Cyber crimes that exclusively involve social media platforms.
- Criminal acts that primarily aim to steal physical goods.
What was one of the consequences of cyber crime mentioned in the content?
What was one of the consequences of cyber crime mentioned in the content?
- Threatening national security and financial stability. (correct)
- Boosting online commerce through internet exploitation.
- Enhancing personal privacy settings.
- Improving computer security protocols.
Which of the following was NOT listed as a major cyber attack in 2017?
Which of the following was NOT listed as a major cyber attack in 2017?
What is the main motive typically associated with cyber crimes?
What is the main motive typically associated with cyber crimes?
What distinguishes the Dark Web from the Deep Web?
What distinguishes the Dark Web from the Deep Web?
Which of the following statements about the Surface Web is true?
Which of the following statements about the Surface Web is true?
What is the approximate cost of a U.S. credit card with track data on the Dark Web?
What is the approximate cost of a U.S. credit card with track data on the Dark Web?
Which activity is less common in the Deep Web compared to the Dark Web?
Which activity is less common in the Deep Web compared to the Dark Web?
Which of the following examples is categorized under the type of cyber crimes where computers are used to commit crime?
Which of the following examples is categorized under the type of cyber crimes where computers are used to commit crime?
How is the Deep Web primarily characterized?
How is the Deep Web primarily characterized?
What is the typical price range for hacking into a website on the Dark Web?
What is the typical price range for hacking into a website on the Dark Web?
Which of the following is NOT a characteristic of the Dark Web?
Which of the following is NOT a characteristic of the Dark Web?
What percentage of security safeguards relies on the computer user adhering to good practices?
What percentage of security safeguards relies on the computer user adhering to good practices?
What should you do to ensure your operating system and applications remain secure?
What should you do to ensure your operating system and applications remain secure?
Which of the following is a good practice for creating passwords?
Which of the following is a good practice for creating passwords?
Why should you avoid clicking on unknown links or attachments?
Why should you avoid clicking on unknown links or attachments?
What is a sign that a website is secure for entering sensitive information?
What is a sign that a website is secure for entering sensitive information?
What is one of the consequences of failing to adhere to security practices?
What is one of the consequences of failing to adhere to security practices?
How can you reduce the risk of data interception on wireless networks?
How can you reduce the risk of data interception on wireless networks?
What is the main responsibility of an individual using a computer regarding security?
What is the main responsibility of an individual using a computer regarding security?
What is the primary goal of hacking?
What is the primary goal of hacking?
Which of the following best defines theft of information?
Which of the following best defines theft of information?
Email bombing results in which of the following?
Email bombing results in which of the following?
What characterizes a Trojan Attack?
What characterizes a Trojan Attack?
What type of cyber attack involves small unauthorized deductions over time?
What type of cyber attack involves small unauthorized deductions over time?
How do worms differ from viruses?
How do worms differ from viruses?
What is the purpose of a Denial of Service (DoS) attack?
What is the purpose of a Denial of Service (DoS) attack?
Which of the following correctly describes a virus?
Which of the following correctly describes a virus?
What is the primary objective of Cyber-Terrorism?
What is the primary objective of Cyber-Terrorism?
Which aspect does NOT fall under the umbrella of Computer Security?
Which aspect does NOT fall under the umbrella of Computer Security?
What triggers a logic bomb to activate?
What triggers a logic bomb to activate?
What is a key reason for the importance of Computer Security?
What is a key reason for the importance of Computer Security?
Which of the following is NOT a common method of cyber-crime?
Which of the following is NOT a common method of cyber-crime?
What does the '90 / 10' Rule in computer security signify?
What does the '90 / 10' Rule in computer security signify?
Which of the following best describes Web Jacking?
Which of the following best describes Web Jacking?
What mechanism is NOT typically included in the processes of Computer Security?
What mechanism is NOT typically included in the processes of Computer Security?
Flashcards are hidden until you start studying
Study Notes
Cybercrime Definition
- Cybercrime is any crime that involves a computer or mobile device and a network.
- Cybercrime can be committed using a computer or targeting a computer.
- Cybercrime can be defined as "Offences that are committed against individuals or groups with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as the Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)."
Classification of Cyber Crimes
- Cyber crimes can be categorized by how the computer is involved: either as a tool to commit the crime or as a target.
Computer Intrusions and Hacking
- Hacking is the illegal access to a computer system or network.
- Hacking can be used to commit various cyber crimes, including theft and terrorism.
Computer Security
- Computer security is the protection of computing systems and the data they store or access.
- Computer Security covers processes and mechanisms that protect computer-based equipment, information, and services from unauthorized access, change, or destruction.
- Computer security includes protection from unintended or unauthorized events and natural disasters.
Importance of Computer Security
- Computer security is essential for enabling job tasks, education, and research.
- Computer security supports critical business processes.
- Computer security protects personal and sensitive information.
90-10 Rule of Security
- The 90/10 Rule states that 10% of security safeguards are technical and 90% rely on user behavior.
- Example: A door lock provides technical security, but user habits like locking it, checking if it's closed, and keeping the keys secure are crucial for effective security.
- Everyone using a computer needs to understand and practice good security habits.
Consequence of Security Violations
- Security violations can lead to compromised personal or confidential information.
- Potential risks include identity theft, data corruption or destruction, and unavailability of critical information in emergencies.
Simple Security Measures
- Use strong and unique passwords that are difficult to guess.
- Keep passwords secret.
- Update operating systems and applications with necessary security patches.
- Use up-to-date antivirus and anti-spyware software.
- Avoid clicking on unknown or unsolicited links or attachments.
- Do not download unknown files or programs.
- Use HTTPS connections and look for the padlock symbol in the URL bar when entering sensitive information or passwords.
Biggest Cyber Attacks of 2017
- Equifax Data Breach – 145.5 Million Accounts
- Uber Data Breach – 57 Million Records
- WannaCry Cyber Attack – 300,000 Systems
- Yahoo! Makes History, Again – 3 Billion Accounts
- Deep Root Analytics Data Breach – 198 Million U.S. Voters
- Rasputin Attacks – 60 Universities and Federal Agencies
Dark Web vs Deep Web vs Surface Web
- Surface Web: Indexed by search engines, minimal illegal activity.
- Deep Web: Not indexed by search engines, little illegal activity outside of the Dark Web, large and growing.
- Dark Web: Restricted to special browsers, not indexed by search engines, significant illegal activity, accessed with passwords, encryption, or gateway software.
Cost of Information on the Dark Web
- Bank credential: $1,000 plus (6% of the total account balance)
- U.S. credit card with track data: $12
- EU, Asia credit card with track data: $28
- Hacking into a website: $100 to $300
- Counterfeit social security cards: $250 to $400
- Counterfeit driver's license: $100 to $150
Examples of Cyber Crimes where Computers are Tools
- Threatening emails
- Identity theft
- Defamation
- SPAM and Phishing
Examples of Cyber Crimes where Computers are Targets
- Viruses
- Worms
- Industrial espionage
- Software piracy
- Hacking
Specific Examples of Cybercrimes
- Theft of Information: Includes stealing data from computer hard disks or removable storage media, potentially leading to identify theft.
- Email Bombing: Involves sending massive amounts of email to a victim, causing the email account or server to crash.
- Salami Attacks: Financial crime where a small amount of money is deducted over time from multiple accounts, going unnoticed by the account holder.
- Denial of Service (DoS) Attack: Overloads a computer resource with requests, causing it to crash and deny service to authorized users.
- Virus: A program that attaches to a computer or file and replicates, often affecting data by altering or deleting it.
- Logic Bombs: Programs that activate only when a specific event occurs, such as a specific date.
- Trojan Attacks: Unauthorized programs disguised as authorized software, concealing their true purpose.
- Worm: Self-replicating programs that spread without needing a host file (unlike viruses), consuming memory and causing system problems.
- Web Jacking: The forceful taking control of a website by cracking passwords.
- Cyber-Terrorism: Hacking designed to instill terror, using similar tactics to conventional terrorism.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.