2.2 - Danger Online
16 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of malware encrypts data on a computer and demands payment for its release?

  • Ransomware (correct)
  • Spyware
  • Trojan
  • Adware
  • Adware is considered as damaging as viruses and ransomware because it can destroy files and steal data.

    False (B)

    What is the primary method that criminals often use to spread malware?

    email

    __________ is a type of malware that hides inside another program, such as a game.

    <p>Trojan</p> Signup and view all the answers

    Match each type of malware with its primary function:

    <p>Virus = Spreads and infects files, potentially destroying data Spyware = Records user keystrokes and login details Adware = Displays unwanted advertisements Ransomware = Encrypts data and demands payment for decryption</p> Signup and view all the answers

    A user notices an unusually high number of pop-up ads on their computer. Which type of malware is MOST likely the cause?

    <p>Adware (B)</p> Signup and view all the answers

    Opening an email attachment from an unknown sender is a safe practice as long as your antivirus software is up to date.

    <p>False (B)</p> Signup and view all the answers

    Besides hospitals, which other critical infrastructures could be severely impacted by a ransomware attack?

    <p>government</p> Signup and view all the answers

    Which of the following actions is a cybercriminal LEAST likely to perform?

    <p>Developing software to improve computer security. (B)</p> Signup and view all the answers

    Cybercriminals only target large organizations and never target individual users.

    <p>False (B)</p> Signup and view all the answers

    Briefly describe how a criminal might use identity theft to fraudulently obtain goods or services.

    <p>A criminal can use a stolen identity to open bank accounts or credit cards in someone else's name and then use these accounts to buy goods or steal money.</p> Signup and view all the answers

    A _________ attack involves creating a fake website that looks like a legitimate one to steal login credentials.

    <p>phishing</p> Signup and view all the answers

    Match each cybercrime method with its description:

    <p>Identity theft = Stealing personal information to impersonate someone else. Phishing = Creating fake websites to steal login credentials. Scamming = Sending fraudulent emails to request money or offer fake goods. Hacking = Breaking into a computer system to steal data.</p> Signup and view all the answers

    Which of the following is a key characteristic of malware?

    <p>It is designed to steal information or damage computer systems. (C)</p> Signup and view all the answers

    Banks never hire hackers to test their systems' security.

    <p>False (B)</p> Signup and view all the answers

    Explain why it's important for individuals to keep their software updated regularly.

    <p>Regular software updates often include security patches that fix vulnerabilities that cybercriminals could exploit, enhancing overall system security.</p> Signup and view all the answers

    Flashcards

    Cybercrime

    Criminal activities conducted via the internet.

    Identity Theft

    Stealing personal information to impersonate someone else.

    Phishing

    Fraudulent emails tricking users into revealing personal info.

    Scamming

    Sending false messages to deceive victims into giving money.

    Signup and view all the flashcards

    Hacking

    Unauthorized access to computer systems to steal data.

    Signup and view all the flashcards

    Malware

    Malicious software designed to harm or exploit computers.

    Signup and view all the flashcards

    Cybercriminal

    An individual committing crimes through the internet.

    Signup and view all the flashcards

    Computer Security Weak Spots

    Vulnerabilities in systems that hackers can exploit.

    Signup and view all the flashcards

    Virus

    A type of malware that spreads by infecting files, potentially causing harm or simply creating nuisance messages.

    Signup and view all the flashcards

    Trojan

    Malware disguised as a legitimate program, releasing harmful functions upon activation.

    Signup and view all the flashcards

    Ransomware

    A malware that encrypts files on a victim's computer, demanding payment to decrypt them.

    Signup and view all the flashcards

    Spyware

    Software that secretly records user activities, especially keystrokes, to steal sensitive information.

    Signup and view all the flashcards

    WannaCry

    A notable ransomware attack in 2017 that affected over 200,000 computers globally, disrupting health services.

    Signup and view all the flashcards

    Email Scams

    Methods using fake emails to trick users into downloading malware or revealing information.

    Signup and view all the flashcards

    Study Notes

    Cybercrime

    • Cybercrime is using the internet to commit crimes.
    • Cybercriminals may sell illegal goods online or steal money/possessions.
    • Criminals use several methods to steal money and identities.

    Cybercrime Methods

    • Identity theft: Criminals steal personal information (name, address, social security numbers, passport numbers) to impersonate others and open accounts in false names. They then use these accounts to buy goods or steal money.

    • Phishing: Criminals create fake websites that look like legitimate bank or shopping sites. They send fake emails that appear to come from a bank or store, tricking recipients into logging in to fake websites to steal their login details.

    • Scamming: Criminals send emails asking for money, sometimes with threats of legal action or offering extremely low prices for goods. They try to trick people into sending money.

    • Hacking: Criminals break into computer systems to steal files or personal information. Banks and other organizations sometimes hire hackers to find vulnerabilities in their systems and fix them before malicious hackers exploit them.

    Malware

    • Malware is software criminals use to damage computers (steal information, stop computers from working).
    • Virus: Infects files and is very difficult to eliminate. Some are relatively harmless, while others are harmful and destroy files or steal data.
    • Trojan: Malware hidden inside a program (often games or other legitimate software). When the program is run, the malware activates.
    • Ransomware: Encrypts computer data, making it unusable. Criminals demand payment to decrypt files.
    • Spyware: Records user actions (typing, mouse clicks) to steal login details.
    • Adware: Displays unwanted ads. While not as harmful as other malware, it indicates vulnerability.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    ICT - Grade-7 - Term-3 - Chapter-2 - Module-2.2

    More Like This

    Cybercrime and Internet Security Quiz
    10 questions
    Cybercrime Study Notes Quiz
    10 questions
    Cyber Crime Introduction and Impact
    41 questions
    Use Quizgecko on...
    Browser
    Browser