CyberCrime GEE Flashcards

1
Q

What is the definition of cybersecurity?

A) The practice of defending computer systems and networks from cyber threats.
B) The process of installing anti-virus software on personal devices.
C) The protection of physical assets in a data center.
D) The management of hardware and network resources.

A

The practice of defending computer systems and networks from cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary difference between cybercrime and cybercriminals?

A) Cybercrime refers to the illegal activities, while cybercriminals are the individuals who commit these crimes.
B) Cybercrime refers to the punishment of cybercriminals.
C) Cybercriminals are activities performed over the internet, while cybercrime is related to physical crimes.
D) Cybercrime refers to the prevention of online threats.

A

Cybercrime refers to the illegal activities, while cybercriminals are the individuals who commit these crimes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What distinguishes cybercrime from cybercriminals?

A) Cybercrime is the crime, while cybercriminals are the individuals who commit the crime.
B) Cybercrime refers to crimes against the internet, while cybercriminals are professionals in cybersecurity.
C) Cybercriminals are responsible for the prevention of cybercrime.
D) Cybercrime refers to digital threats, while cybercriminals are the victims.

A

Cybercrime is the crime, while cybercriminals are the individuals who commit the crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is NOT a type of cybercrime?

A) Phishing Theft
B) Banking Fraud
C) Software Piracy
D) Personal Injury Fraud

A

Personal Injury Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a cybercriminal?

A) Someone who helps protect systems from cyber threats.
B) A person who commits illegal activities using computers or the internet.
C) A victim of online scams.
D) A person who creates new software systems.

A

A person who commits illegal activities using computers or the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a potential impact of cybercrime on individuals?

A) Social media manipulation
B) Financial loss or loss of income
C) Increase in national security concerns
D) None of the above

A

Financial loss or loss of income

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following best describes cybercrime?

A) A legal activity performed on the internet.
B) Illegal activities that involve computers, networks, or digital devices.
C) The protection of computers from hacking.
D) The creation of software programs for security.

A

Illegal activities that involve computers, networks, or digital devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

According to Parker (1998), what is one characteristic typically found in cybercriminals?

A) Aggression
B) Curiosity
C) Authority
D) Impatience

A

Curiosity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of these is NOT a type of cybercrime?

A) Email scams
B) Social media fraud
C) Malware
D) Organizing charity events

A

Organizing charity events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the primary difference between hacking and cracking?

A) Hacking is illegal, while cracking is legal.
B) Cracking involves bypassing security measures to steal data, while hacking is generally associated with exploring or testing systems.
C) Both hacking and cracking involve theft.
D) Hacking and cracking are terms used interchangeably.

A

Cracking involves bypassing security measures to steal data, while hacking is generally associated with exploring or testing systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a type of cybercrime?

A) Cyber espionage
B) Data privacy law enforcement
C) File sharing
D) Software licensing

A

Cyber espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an example of cyber vandalism?

A) Phishing emails targeting users
B) Deleting or damaging files on a computer system without permission
C) Fraudulent use of someone’s credit card
D) Sending viruses through email attachments

A

Deleting or damaging files on a computer system without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the potential impact of cybercrime on individuals?

A) Financial loss or loss of income
B) Legal benefits
C) Improved security awareness
D) Free access to software

A

Financial loss or loss of income

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a major technique used by law enforcement to catch cybercriminals?

A) Use of wiretaps on phone lines
B) Keystroke monitoring software
C) Tracking IP addresses
D) All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a potential impact of cybercrime on national security?

A) Increased healthcare costs
B) Economic growth
C) National security concerns
D) Increased social media engagement

A

National security concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a prevention strategy for businesses to protect against cybercrime?

A) Ignoring cybersecurity policies
B) Investing in creator insurance
C) Avoiding government initiatives and policies
D) Reducing employee training on cybersecurity measures

A

Investing in creator insurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What emotional impact can cybercrime have on individuals?

A) Emotional trauma
B) Increased happiness
C) Personal development
D) Increased job opportunities

A

Emotional trauma

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the role of a Personal Information Controller?

A) Collects and processes personal information
B) Controls the storage and usage of personal information
C) Is responsible for reporting cybercrime
D) Manages the enforcement of data protection laws

A

Controls the storage and usage of personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following traits is typically associated with cybercriminals, according to Parker (1998)?

A) Curiosity
B) Kindness
C) Patience
D) Introversion

A

Curiosity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following rights of a data subject allows them to correct their information?

A) Right to Erasure
B) Right to Object
C) Right to Correct
D) Right to File a Complaint

A

Right to Correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of these is a category of typical computer criminals, according to Forester and Morrison (1994)?

A) Professional criminals
B) Police officers
C) Internet service providers
D) Customers of a business

A

Professional criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is an example of social media fraud?

A) Someone posting harmful content on social media
B) A hacker stealing personal data from a social media platform
C) A business using social media to sell fake products
D) All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What distinguishes hacking from cracking?

A) Hacking involves breaking into systems to steal data, while cracking is used for testing systems.
B) Hacking is illegal, while cracking is legal.
C) Cracking involves testing systems, while hacking involves exploration.
D) Hacking involves theft, while cracking involves exploration.

A

Hacking involves theft, while cracking involves exploration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is considered a “typical” cybercriminal based on Forester and Morrison (1994)?

A) A young hacker with limited skills
B) An experienced hacker from an overseas criminal organization
C) A loyal employee who becomes involved in cybercrime
D) A random person with no prior knowledge of computers

A

A loyal employee who becomes involved in cybercrime

25
What is an example of cyber vandalism? A) Phishing emails targeting users B) Deleting or damaging files on a computer system without permission C) Fraudulent use of someone’s credit card D) Sending viruses through email attachments
Deleting or damaging files on a computer system without permission
26
What is a form of cybercrime that involves using malicious software to take control of someone's computer or network? A) Malware B) Ransomware C) Phishing D) Cyber Espionage
Ransomware
27
What is considered an illegal action in hacking? A) Breaking into a system to change data without authorization B) Analyzing code for improvement C) Testing network security D) Exploring a website’s design
Breaking into a system to change data without authorization
28
What is a significant impact of cybercrime on businesses? A) Increased revenue B) Legal repercussions C) Loss of intellectual property D) Both B and C
Both B and C
29
Which of the following is a technique used by law enforcement to track cybercriminals? A) Keystroke monitoring software B) IP address tracking only C) Database encryption D) Social media manipulation
Keystroke monitoring software
30
Which of the following is true about Personal Identifiable Information (PII)? A) It refers to any information that identifies an individual. B) It is public information that can be shared freely. C) It includes only the name and age of an individual. D) It is irrelevant in the context of cybersecurity.
It refers to any information that identifies an individual.
31
What is one of the strategies for preventing cybercrime in businesses? A) Ignoring cybersecurity measures B) Using outdated software C) Implementing strong cybersecurity measures and policies D) Reducing awareness campaigns
Implementing strong cybersecurity measures and policies
32
Which of the following is a type of cybercrime involving fraudulent emails? A) Phishing Theft B) Malware C) Data Breaches D) DDoS Attacks
Phishing Theft
33
What is the role of a Personal Information Processor? A) Collects and processes personal information on behalf of a controller. B) Stores personal information securely. C) Decides how personal information will be processed. D) Manages legal procedures in case of data breaches.
Collects and processes personal information on behalf of a controller.
34
Which type of cybercrime involves using the internet to steal or damage an individual’s financial assets? A) Banking Fraud B) Cyber Espionage C) Cyber Terrorism D) Online Harassment
Banking Fraud
35
Which of the following is a type of personal information? A) Email address B) Software version number C) Public posts on social media D) IP address of a company website
Email address
36
What is the definition of Cyber Espionage? A) The act of stealing personal data through social media platforms B) The use of the internet to gain unauthorized access to private information for political or economic gain C) The act of using malware to take over a system D) The practice of stealing passwords to gain access to personal accounts
The use of the internet to gain unauthorized access to private information for political or economic gain
37
Which right of data subjects allows them to request access to their personal data? A) Right to Erasure B) Right to Object C) Right to Access D) Right to Damages
Right to Access
38
What is one potential emotional impact of cybercrime? A) Increased revenue for businesses B) Identity theft C) Emotional trauma from online harassment or threats D) Government regulation changes
Emotional trauma from online harassment or threats
39
What is the "right to erasure" in the context of personal data? A) The right to keep personal data indefinitely B) The right to request that personal data be erased from a system C) The right to access and view personal data D) The right to object to data processing
The right to request that personal data be erased from a system
40
What category of cybercriminals does Forester and Morrison (1994) describe as teenage hackers? A) Amateur hackers B) Professional criminals C) Loyal employees D) Cyber terrorists
Amateur hackers
41
Which of these is an example of a data breach? A) A user forgetting their password B) A company’s confidential data being accessed by unauthorized individuals C) A website temporarily going offline D) A user updating their social media settings
A company’s confidential data being accessed by unauthorized individuals
42
What is the purpose of investing in cybersecurity measures for businesses? A) To reduce employee productivity B) To ensure secure transactions and protect sensitive data C) To avoid paying taxes D) To decrease government monitoring
To ensure secure transactions and protect sensitive data
43
What does phishing theft involve? A) Stealing personal data through deceptive emails or websites B) Hacking into private networks C) Vandalizing websites with harmful scripts D) Creating fake social media accounts
Stealing personal data through deceptive emails or websites
44
What is the primary aim of DDoS attacks? A) To destroy physical computer hardware B) To flood a website with traffic to overwhelm and disable it C) To steal personal information from individuals D) To monitor keystrokes on a user's device
To flood a website with traffic to overwhelm and disable it
45
What is the role of cybersecurity in businesses? A) To prevent the development of new technologies B) To prevent and respond to cyber threats that could harm business operations C) To promote illegal activities online D) To support digital marketing campaigns
To prevent and respond to cyber threats that could harm business operations
46
What is the term for unauthorized access to a computer system to steal or damage sensitive data? A) Cracking B) Hacking C) Cyber Espionage D) Cyber Piracy
Cyber Espionage
47
Which of the following is an example of a cybercriminal category? A) Professional hackers who engage in illegal activities for financial gain B) Employees who work for cybersecurity firms C) Consumers who buy legal software online D) Students studying network security
Professional hackers who engage in illegal activities for financial gain
48
Which of the following is NOT considered a typical category of a cybercriminal? A) Teenage hacker B) Professional criminal C) Business owner D) Loyal employee turned criminal
Business owner
49
What is ransomware? A) A type of virus that deletes files on a computer B) A malicious software that locks a user’s system and demands payment for access C) A type of phishing attack D) A form of malware that monitors user activity
A malicious software that locks a user’s system and demands payment for access
50
Which of the following is a type of cybercrime that involves sending fraudulent emails that attempt to deceive individuals into revealing personal information? A) Phishing B) Malware C) Ransomware D) Data Breaches
Phishing
51
Which of the following is an example of online harassment? A) Sending threatening emails to someone B) Participating in online voting C) Watching educational videos on the internet D) Submitting a business application online
Sending threatening emails to someone
52
Which of the following describes the impact of cybercrime on national security? A) Cybercrime has no impact on national security B) Cybercrime can lead to the theft of classified government information C) Cybercrime can only affect individuals, not the country D) Cybercrime increases internet speeds for everyone
Cybercrime can lead to the theft of classified government information
53
What is cyber terrorism? A) Using the internet to commit physical violence B) Hacking into networks for political or ideological purposes C) Sending spam emails to attack businesses D) Monitoring internet traffic for national security
Hacking into networks for political or ideological purposes
54
What action does the right to erasure allow a data subject to take? A) Access their data B) Request the deletion of their personal data C) Correct their personal data D) Object to the use of their data
Request the deletion of their personal data
55
What does "data portability" allow a data subject to do? A) Request the deletion of their data from a system B) Move their personal data from one service provider to another C) File a complaint against a data controller D) Correct inaccuracies in their personal data
Move their personal data from one service provider to another
56
What kind of cybercrime involves damaging a company's reputation by spreading false information online? A) Cyber Terrorism B) Social Media Manipulation C) Online Harassment D) Cyber Espionage
Social Media Manipulation
57
What is "social media manipulation" in the context of cybercrime? A) Using social media to mislead or influence public opinion through false information B) Creating a new social media platform C) Sharing personal data of users on social media D) Designing social media profiles for marketing
Using social media to mislead or influence public opinion through false information
58
Which of the following is NOT a type of cybercrime listed in the course content? A) Cyber Espionage B) Data breaches C) Tax evasion D) Ransomware
Tax evasion