Common Types Of Cybercrimes Flashcards

1
Q

What are common types of cybercrimes?

A

Common types of cybercrimes include hacking, malware, and hacktivism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is hacking?

A

Hacking is the act of unauthorized breaking into a computer system or online account, compromising devices, systems, and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ransomware?

A

Ransomware is a type of hacking used to solicit money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are black hat hackers?

A

Black hat hackers are the ‘bad guys’ who exploit vulnerabilities for monetary gain or malicious purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do black hat hackers do?

A

They steal sensitive personal information, breach systems, and disrupt functionality of websites and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are white hat hackers?

A

White hat hackers are the ‘good guys’ who use ethical hacking to prevent black hat hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ethical hacking?

A

Ethical hacking, also known as penetration testing, involves assessing and testing network security to expose vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are grey hat hackers?

A

Grey hat hackers violate standards without intent to harm, often exposing vulnerabilities for the common good.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is hacktivism?

A

Hacktivism is the use of technology to publicize a social, ideological, religious, or political message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is malware?

A

Malware stands for malicious software, designed to harm or exploit devices or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the impact of malware on cyber-physical systems?

A

Malware poses a security threat to cyber-physical systems, which rely on the internet and ICT services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is hacking?

A

The act of unauthorized breaking into a computer system or online account, compromising the device, system, and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the main types of hackers?

A
  • Black Hat Hackers
  • White Hat Hackers
  • Grey Hat Hackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who are Black Hat Hackers?

A

The ‘bad guys’ of the hacking community who exploit vulnerabilities for monetary gain or malicious purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the role of White Hat Hackers?

A

They prevent Black Hat Hackers through ethical hacking and vulnerability assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What distinguishes Grey Hat Hackers?

A

They violate standards without harmful intent, often exposing vulnerabilities for public awareness.

17
Q

Fill in the blank: _______ are hackers who utilize technology to publicize a social, ideological, religious, or political message.

A

[Hacktivists]

18
Q

What does malware stand for?

A

Malicious software designed to harm or exploit a device or network.

19
Q

List the types of malware.

A
  • Viruses
  • Trojan Horses
  • Worms
  • Spyware
  • Zombie/Botnets
  • Spam
  • Adware
  • Ransomware
20
Q

What are viruses?

A

Programs that replicate and spread autonomously, often causing harm to files and systems.

21
Q

What is a Trojan Horse?

A

A seemingly useful software that compromises security without replicating itself.

22
Q

How do worms operate?

A

They are self-replicating programs that transfer themselves across networks automatically.

23
Q

What is spyware?

A

Malware that gathers user data without consent, often hidden from the user.

24
Q

What is the primary function of adware?

A

To deliver advertisements automatically, often bundled with free software.

25
What is ransomware?
Malware that takes over a system until a ransom is paid to regain access.
26
What is a Denial-of-Service (DoS) attack?
A targeted attack that floods a network with false requests to disrupt operations.
27
What differentiates DoS from DDoS attacks?
DoS attacks originate from one system, while DDoS attacks come from multiple systems.
28
List the types of DDoS attacks.
* Volumetric attacks * Protocol attacks * Application layer attacks
29
What is phishing?
A cyber attack that lures victims into revealing private information or downloading malicious files.
30
What is spear phishing?
A targeted phishing attack aimed at specific individuals or organizations.
31
What is whaling in the context of phishing?
Phishing attacks targeting senior executives to steal sensitive information.
32
What does SMiShing refer to?
Sending fraudulent text messages to trick individuals into sharing sensitive data.
33
What is spoofing?
A technique where cybercriminals disguise as a reputable source to steal information.
34
What is domain spoofing?
A form of phishing where an attacker uses a fake website or email domain to deceive victims.
35
What is ARP spoofing?
A spoofing attack that intercepts data by tricking a device into sending messages to the hacker.
36
What are identity-based attacks?
Attacks that occur when a user's credentials are hacked and someone impersonates that user.
37