Chapter 2 Flashcards

1
Q

Define cybercrime

A

A criminal offence committed through a computer or the Internet that causes loss or damage to the victims computer system, network, or data; denies access to data or service; or enable further related crimes, such as extortion or the resale of stolen data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cybercrime has led to the amendments in the criminal code that make what activities illegal?

A

Using a computer without authorization
Making mischief in relation to data
Possessing a device to obtain telecommunications facility or service without authorization
Stealing telecommunication service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain malware

A

Short for “malicious software”, it is the tool most frequently used by cyber criminals to steal personal, financial, and business information, or disrupt computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain denial of service attacks

A

Use malware to create botnets to build a network of computers that can be hijacked and controlled remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain ransomware

A

Attacks use malware to encrypt files on computers or networks and demand that the victim pay a ransom to obtain the decryption tool so the files can be released

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain doxing

A

Criminals steal the data before any file description and then threatened to publish the information unless payment is made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain viruses and worms

A

These are standalone malware programs that self replicate and automatically spread to other computers. They are designed to exploit vulnerabilities and network server programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Trojan horse

A

A Trojan horse can be used to create a back door and allow an infected computer to be controlled remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain social engineering

A

Criminals use psychological manipulation to achieve their goals. They may send the user upsetting or exciting information design to trigger an urgent response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain phishing

A

An email that looks to be from a trusted source tricks the recipient into sharing personal information by email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain pharming

A

An email that looks to be from a trusted source direct users to a false website to enter their information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain watering holes

A

Criminals identify and infect websites that are likely to be visited by the individuals who they have targeted and infect their computer with malware if/when they visit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the direct losses associated with cyber losses?

A

Corporate espionage costs including ransom or extortion payments
Theft of intellectual property
Theft of funds
Theft of confidential information
Equipment damage costs
Opportunity cost
Regulatory penalties
Loss of key staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the indirect losses associated with cyber losses?

A

Extra expenses
Accounting and other professional fees
Loss of competitiveness
Loss of business
Loss of supply
Loss of reputation
Loss of opportunity
Diminished employee productivity
Loss of certification
Litigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

After a cyber incident, what are the four categories under recovery costs?

A

Discovery- cost to detect a data breach or another type of compromise and companies network security intelligence
Investigation- cost to analyze evidence related to a cyber attack
Containment- cost to contain the cyber incident and prevent the attack from spreading
Recovery- affected computer systems can be put back in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define extortion

A

The practice of obtaining something, especially money, through force or threats

17
Q

What are identity thefts able to do?

A

Spend money from the victims account
Open new bank accounts
Change the victims passwords and contact information
Apply for loans, credit cards, and benefits
Reduce or destroy victims credit status
Change ownership to victims property
Enter into fraudulent lease agreement
Enter contracts to purchase or lease car in victims name
Cause the victim to incur tax liability
Cause the victim loss to day to day access to cash