Cybercrime Flashcards

1
Q

refers to criminal
activities or illegal actions
that are carried out using computer
networks, the internet, or digital devices.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to criminal activities that target or use computers, networks, or
networked devices.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The use of cloud services for data storage and access introduces significant security risks, especially when employees use unapproved services.

A

Cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The practice of allowing employees to use personal
devices for work boosts productivity but raises security concerns due to potential malware exposure from non-work activities.

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exploits often arise from poor software design,
and the delay in patching these vulnerabilities can lead to security breaches.

A

Commercial Software Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The most vulnerable part of any security system are the users
themselves. From opening uncertain links to downloading unauthorized files, users are
vulnerable to these exploits.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A piece of programming code, usually disguised
as something else, that causes a computer to
behave in an unexpected and usually undesirable manner.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is a harmful program that resides in the
active memory of the computer and duplicates
itself.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a program in which malicious code is hidden inside a seemingly harmless program.

A

Trojan Horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is the abuse of email systems to send unsolicited emails to a large number of people.

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A malicious attempt to disrupt the normal
functioning of a targeted server, service, or
network by overwhelming it with a flood of internet traffic

A

DDOS (distributed denial of service) Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attackers
impersonate legitimate entities, such as banks,
companies, or government agencies, to trick individuals into providing sensitive information
or performing actions that compromise their
security

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a form of
phishing attack conducted through
SMS or text messages

A

Smishing (SMS Phishing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a type of
phishing attack carried out through
voice calls, typically using Voice over
Internet Protocol (VoIP) technology

A

Vishing (Voice Phishing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Criminal
hackers who break into computer
systems or networks for malicious
purposes, such as stealing data,
causing damage, or financial gain.

A

Black Hat Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ethical hackers
who use their skills for legal and
beneficial purposes, such as testing
system security or conducting penetration testing

A

White Hat Hackers

17
Q

Individuals or
groups who create
and distribute
malicious software (malware) like
viruses, worms, trojans,
ransomware, and
spyware to
compromise
systems or steal
data

A

Malware authors

18
Q

Individuals who use phishing techniques, such as fake emails,
websites, or messages, to trick
users into providing sensitive information like passwords,
credit card details, or personal
information.

19
Q

Perpetrators
who engage in online scams, such
as fake lottery winnings, romance
scams, investment fraud, or tech
support scams, to deceive victims
and obtain money or personal
information.

A

Online scammers

20
Q

Criminals who
impersonate company executives
or suppliers to deceive employees
into making unauthorized transfers
or disclosing sensitive information.

A

Business Email Compromise (BEC)
Scammers

21
Q

Employees or insiders who
misuse their authorized
access to systems or data for
malicious purposes, such as data theft, sabotage, or
fraud.

22
Q

Activists or groups who use
hacking techniques to promote
social or political causes, such
as defacing websites, leaking
sensitive information, or
disrupting online services.

A

Hacktivists

23
Q

Defines and
penalizes various cybercrimes, including illegal access to computer systems,
data interference, and computer-related fraud.

A

Cybercrime Prevention Act of 2012 (Republic Act No. 10175)

24
Q

Requires organizations to
implement security measures to safeguard sensitive information from unauthorized access, disclosure, or misuse

A

Data Privacy Act of 2012 (Republic Act No. 10173)

25
Involves collaboration among government agencies, private sector entities, and cybersecurity experts to implement cybersecurity measures, incident response mechanisms, and awareness programs
National Cybersecurity Plan (NCSP)