Cybercrime Flashcards

1
Q

refers to criminal
activities or illegal actions
that are carried out using computer
networks, the internet, or digital devices.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to criminal activities that target or use computers, networks, or
networked devices.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The use of cloud services for data storage and access introduces significant security risks, especially when employees use unapproved services.

A

Cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The practice of allowing employees to use personal
devices for work boosts productivity but raises security concerns due to potential malware exposure from non-work activities.

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exploits often arise from poor software design,
and the delay in patching these vulnerabilities can lead to security breaches.

A

Commercial Software Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The most vulnerable part of any security system are the users
themselves. From opening uncertain links to downloading unauthorized files, users are
vulnerable to these exploits.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A piece of programming code, usually disguised
as something else, that causes a computer to
behave in an unexpected and usually undesirable manner.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is a harmful program that resides in the
active memory of the computer and duplicates
itself.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a program in which malicious code is hidden inside a seemingly harmless program.

A

Trojan Horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is the abuse of email systems to send unsolicited emails to a large number of people.

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A malicious attempt to disrupt the normal
functioning of a targeted server, service, or
network by overwhelming it with a flood of internet traffic

A

DDOS (distributed denial of service) Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attackers
impersonate legitimate entities, such as banks,
companies, or government agencies, to trick individuals into providing sensitive information
or performing actions that compromise their
security

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a form of
phishing attack conducted through
SMS or text messages

A

Smishing (SMS Phishing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a type of
phishing attack carried out through
voice calls, typically using Voice over
Internet Protocol (VoIP) technology

A

Vishing (Voice Phishing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Criminal
hackers who break into computer
systems or networks for malicious
purposes, such as stealing data,
causing damage, or financial gain.

A

Black Hat Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ethical hackers
who use their skills for legal and
beneficial purposes, such as testing
system security or conducting penetration testing

A

White Hat Hackers

17
Q

Individuals or
groups who create
and distribute
malicious software (malware) like
viruses, worms, trojans,
ransomware, and
spyware to
compromise
systems or steal
data

A

Malware authors

18
Q

Individuals who use phishing techniques, such as fake emails,
websites, or messages, to trick
users into providing sensitive information like passwords,
credit card details, or personal
information.

A

Phishers

19
Q

Perpetrators
who engage in online scams, such
as fake lottery winnings, romance
scams, investment fraud, or tech
support scams, to deceive victims
and obtain money or personal
information.

A

Online scammers

20
Q

Criminals who
impersonate company executives
or suppliers to deceive employees
into making unauthorized transfers
or disclosing sensitive information.

A

Business Email Compromise (BEC)
Scammers

21
Q

Employees or insiders who
misuse their authorized
access to systems or data for
malicious purposes, such as data theft, sabotage, or
fraud.

A

Insiders

22
Q

Activists or groups who use
hacking techniques to promote
social or political causes, such
as defacing websites, leaking
sensitive information, or
disrupting online services.

A

Hacktivists

23
Q

Defines and
penalizes various cybercrimes, including illegal access to computer systems,
data interference, and computer-related fraud.

A

Cybercrime Prevention Act of 2012 (Republic Act No. 10175)

24
Q

Requires organizations to
implement security measures to safeguard sensitive information from unauthorized access, disclosure, or misuse

A

Data Privacy Act of 2012 (Republic Act No. 10173)

25
Q

Involves collaboration among government
agencies, private sector entities, and cybersecurity experts to implement
cybersecurity measures, incident response mechanisms, and awareness
programs

A

National Cybersecurity Plan (NCSP)