Cyber-Dependent Offenses Flashcards

1
Q

These are the offenses that are strictly committed using information and communication technologies. … crimes target network systems and data confidentiality, integrity, and availability.

A

Cyber-dependent offenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to someone manipulating a computer system or private network to access digital files or systems without proper authorization

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacking can be classified into five categories:

A
  • Unauthorized access
  • Modification of data
  • Impairment of data
  • Interception of data
  • Misuse of assets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

refers to gaining logical or physical entry to a network, data, website, program, or another system, without proper authorization or credentials.

A

Unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

refers to inserting, removing, or altering data without proper authorization

A

Modification of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

refers to disrupting the transmission or communication of data

A

Impairment of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

refers to unauthorized access and alteration in the data transmission between machines for personal and financial gain

A

Interception of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

refers to the unauthorized use of company files, systems, computers, and networks to damage the company’s properties.

A

Misuse of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These are the attacks that use computers against other computers or networks to modify, steal, or gain information through authorized access. An insider or an outsider can initiate an attack.

A

Cyber-attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

an attack from inside the security perimeter, also called “insider”

A

Inside attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

an attack from outside the security perimeter of the system, also called “outsider”

A

Outside attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

or malicious software- is software-based hacking and cyber-attacking tools.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is designed to spread from one program to another, which can self-replicate. When a virus is executed, it replicates itself by changing other computer programs, documents, or boot sectors.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unlike viruses, this standalone malware replicates itself without human intervention. It uses a computer network to spread itself by depending on the security failures of the targeted computer to access it.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

.. horse or .. virus, appears as a legitimate program when downloaded to a computer. It can be found on file-sharing sites, email attachments, sketchy websites, and hacked Wi-Fi networks

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

sends massive amounts of unsolicited commercial emails to illegally acquired email addresses. While this is illegal, these programs are not fundamentally destructive

A

Spammer

17
Q

used to perform illegal activities such as creating malicious pop-up advertisements, capturing banking login details, and taking screenshots of the visited websites.

A

Spyware