Podcast
Questions and Answers
Which of the following is the main driver of cyber crime?
Which of the following is the main driver of cyber crime?
- Activism
- National interest
- Profitability (correct)
- Specialism
What is a vital element of the cyber crime economy?
What is a vital element of the cyber crime economy?
- Government regulation
- Thriving marketplace (correct)
- International cooperation
- Ethical hacking
What is a common area of interest in the cyber crime marketplace?
What is a common area of interest in the cyber crime marketplace?
- Digital forensics
- Data encryption
- Cybersecurity training
- Identity theft (correct)
How do cyber criminals make stolen money usable and untraceable?
How do cyber criminals make stolen money usable and untraceable?
What is the most common method used by cyber criminals to steal money?
What is the most common method used by cyber criminals to steal money?
What illegal task do criminals often offer their services to carry out?
What illegal task do criminals often offer their services to carry out?
What is the role of specialism in the cyber crime economy?
What is the role of specialism in the cyber crime economy?
What is the purpose of a denial of service (DoS) attack?
What is the purpose of a denial of service (DoS) attack?
What is the main method by which cyber criminals get money?
What is the main method by which cyber criminals get money?
What is the purpose of money laundering in cyber crime?
What is the purpose of money laundering in cyber crime?
Which criminal business model involves offering the ability to disable a competitor or rival for payment from an organization or individual?
Which criminal business model involves offering the ability to disable a competitor or rival for payment from an organization or individual?
What is the main purpose of ransomware attacks?
What is the main purpose of ransomware attacks?
What is the role of cryptocurrencies in facilitating criminal activities?
What is the role of cryptocurrencies in facilitating criminal activities?
What is the final step in the cyber crime economy cycle described in the text?
What is the final step in the cyber crime economy cycle described in the text?
What is the purpose of the malware described in the text?
What is the purpose of the malware described in the text?
What is the role of money mules in the cyber crime economy cycle?
What is the role of money mules in the cyber crime economy cycle?
What is the main objective of the criminal gang in the cyber crime economy cycle?
What is the main objective of the criminal gang in the cyber crime economy cycle?
What is the consequence of the rapid growth of cryptocurrencies in relation to cyber crime?
What is the consequence of the rapid growth of cryptocurrencies in relation to cyber crime?
What is the role of the criminal in the extortion-themed approach described in the text?
What is the role of the criminal in the extortion-themed approach described in the text?
What is the purpose of the criminal offering the ability to disable a competitor or rival in the criminal business model described in the text?
What is the purpose of the criminal offering the ability to disable a competitor or rival in the criminal business model described in the text?
True or false: A company's website can reveal information such as points of contact and building addresses.
True or false: A company's website can reveal information such as points of contact and building addresses.
True or false: Google hacking is a term used to describe advanced search features that can find unintentionally revealed files.
True or false: Google hacking is a term used to describe advanced search features that can find unintentionally revealed files.
True or false: Social media information cannot be pieced together effectively to get an accurate perspective about an individual's personal and work life.
True or false: Social media information cannot be pieced together effectively to get an accurate perspective about an individual's personal and work life.
True or false: Even small pieces of information can add credibility to a social engineering attack.
True or false: Even small pieces of information can add credibility to a social engineering attack.
True or false: Government or public records can be highly valuable sources of information for cyber attackers.
True or false: Government or public records can be highly valuable sources of information for cyber attackers.
True or false: Many stock exchanges require companies to provide financial information to operate.
True or false: Many stock exchanges require companies to provide financial information to operate.