Podcast
Questions and Answers
Which type of malware encrypts data on a computer and demands payment for its release?
Which type of malware encrypts data on a computer and demands payment for its release?
Adware is considered as damaging as viruses and ransomware because it can destroy files and steal data.
Adware is considered as damaging as viruses and ransomware because it can destroy files and steal data.
False (B)
What is the primary method that criminals often use to spread malware?
What is the primary method that criminals often use to spread malware?
__________ is a type of malware that hides inside another program, such as a game.
__________ is a type of malware that hides inside another program, such as a game.
Signup and view all the answers
Match each type of malware with its primary function:
Match each type of malware with its primary function:
Signup and view all the answers
A user notices an unusually high number of pop-up ads on their computer. Which type of malware is MOST likely the cause?
A user notices an unusually high number of pop-up ads on their computer. Which type of malware is MOST likely the cause?
Signup and view all the answers
Opening an email attachment from an unknown sender is a safe practice as long as your antivirus software is up to date.
Opening an email attachment from an unknown sender is a safe practice as long as your antivirus software is up to date.
Signup and view all the answers
Besides hospitals, which other critical infrastructures could be severely impacted by a ransomware attack?
Besides hospitals, which other critical infrastructures could be severely impacted by a ransomware attack?
Signup and view all the answers
Which of the following actions is a cybercriminal LEAST likely to perform?
Which of the following actions is a cybercriminal LEAST likely to perform?
Signup and view all the answers
Cybercriminals only target large organizations and never target individual users.
Cybercriminals only target large organizations and never target individual users.
Signup and view all the answers
Briefly describe how a criminal might use identity theft to fraudulently obtain goods or services.
Briefly describe how a criminal might use identity theft to fraudulently obtain goods or services.
Signup and view all the answers
A _________ attack involves creating a fake website that looks like a legitimate one to steal login credentials.
A _________ attack involves creating a fake website that looks like a legitimate one to steal login credentials.
Signup and view all the answers
Match each cybercrime method with its description:
Match each cybercrime method with its description:
Signup and view all the answers
Which of the following is a key characteristic of malware?
Which of the following is a key characteristic of malware?
Signup and view all the answers
Banks never hire hackers to test their systems' security.
Banks never hire hackers to test their systems' security.
Signup and view all the answers
Explain why it's important for individuals to keep their software updated regularly.
Explain why it's important for individuals to keep their software updated regularly.
Signup and view all the answers
Flashcards
Cybercrime
Cybercrime
Criminal activities conducted via the internet.
Identity Theft
Identity Theft
Stealing personal information to impersonate someone else.
Phishing
Phishing
Fraudulent emails tricking users into revealing personal info.
Scamming
Scamming
Signup and view all the flashcards
Hacking
Hacking
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Cybercriminal
Cybercriminal
Signup and view all the flashcards
Computer Security Weak Spots
Computer Security Weak Spots
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Trojan
Trojan
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
WannaCry
WannaCry
Signup and view all the flashcards
Email Scams
Email Scams
Signup and view all the flashcards
Study Notes
Cybercrime
- Cybercrime is using the internet to commit crimes.
- Cybercriminals may sell illegal goods online or steal money/possessions.
- Criminals use several methods to steal money and identities.
Cybercrime Methods
-
Identity theft: Criminals steal personal information (name, address, social security numbers, passport numbers) to impersonate others and open accounts in false names. They then use these accounts to buy goods or steal money.
-
Phishing: Criminals create fake websites that look like legitimate bank or shopping sites. They send fake emails that appear to come from a bank or store, tricking recipients into logging in to fake websites to steal their login details.
-
Scamming: Criminals send emails asking for money, sometimes with threats of legal action or offering extremely low prices for goods. They try to trick people into sending money.
-
Hacking: Criminals break into computer systems to steal files or personal information. Banks and other organizations sometimes hire hackers to find vulnerabilities in their systems and fix them before malicious hackers exploit them.
Malware
- Malware is software criminals use to damage computers (steal information, stop computers from working).
- Virus: Infects files and is very difficult to eliminate. Some are relatively harmless, while others are harmful and destroy files or steal data.
- Trojan: Malware hidden inside a program (often games or other legitimate software). When the program is run, the malware activates.
- Ransomware: Encrypts computer data, making it unusable. Criminals demand payment to decrypt files.
- Spyware: Records user actions (typing, mouse clicks) to steal login details.
- Adware: Displays unwanted ads. While not as harmful as other malware, it indicates vulnerability.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
ICT - Grade-7 - Term-3 - Chapter-2 - Module-2.2