CyberCrime GEE Flashcards
What is the definition of cybersecurity?
A) The practice of defending computer systems and networks from cyber threats.
B) The process of installing anti-virus software on personal devices.
C) The protection of physical assets in a data center.
D) The management of hardware and network resources.
The practice of defending computer systems and networks from cyber threats.
What is the primary difference between cybercrime and cybercriminals?
A) Cybercrime refers to the illegal activities, while cybercriminals are the individuals who commit these crimes.
B) Cybercrime refers to the punishment of cybercriminals.
C) Cybercriminals are activities performed over the internet, while cybercrime is related to physical crimes.
D) Cybercrime refers to the prevention of online threats.
Cybercrime refers to the illegal activities, while cybercriminals are the individuals who commit these crimes.
What distinguishes cybercrime from cybercriminals?
A) Cybercrime is the crime, while cybercriminals are the individuals who commit the crime.
B) Cybercrime refers to crimes against the internet, while cybercriminals are professionals in cybersecurity.
C) Cybercriminals are responsible for the prevention of cybercrime.
D) Cybercrime refers to digital threats, while cybercriminals are the victims.
Cybercrime is the crime, while cybercriminals are the individuals who commit the crime.
Which of the following is NOT a type of cybercrime?
A) Phishing Theft
B) Banking Fraud
C) Software Piracy
D) Personal Injury Fraud
Personal Injury Fraud
What is a cybercriminal?
A) Someone who helps protect systems from cyber threats.
B) A person who commits illegal activities using computers or the internet.
C) A victim of online scams.
D) A person who creates new software systems.
A person who commits illegal activities using computers or the internet.
Which of the following is a potential impact of cybercrime on individuals?
A) Social media manipulation
B) Financial loss or loss of income
C) Increase in national security concerns
D) None of the above
Financial loss or loss of income
Which of the following best describes cybercrime?
A) A legal activity performed on the internet.
B) Illegal activities that involve computers, networks, or digital devices.
C) The protection of computers from hacking.
D) The creation of software programs for security.
Illegal activities that involve computers, networks, or digital devices.
According to Parker (1998), what is one characteristic typically found in cybercriminals?
A) Aggression
B) Curiosity
C) Authority
D) Impatience
Curiosity
Which of these is NOT a type of cybercrime?
A) Email scams
B) Social media fraud
C) Malware
D) Organizing charity events
Organizing charity events
What is the primary difference between hacking and cracking?
A) Hacking is illegal, while cracking is legal.
B) Cracking involves bypassing security measures to steal data, while hacking is generally associated with exploring or testing systems.
C) Both hacking and cracking involve theft.
D) Hacking and cracking are terms used interchangeably.
Cracking involves bypassing security measures to steal data, while hacking is generally associated with exploring or testing systems.
Which of the following is a type of cybercrime?
A) Cyber espionage
B) Data privacy law enforcement
C) File sharing
D) Software licensing
Cyber espionage
What is an example of cyber vandalism?
A) Phishing emails targeting users
B) Deleting or damaging files on a computer system without permission
C) Fraudulent use of someone’s credit card
D) Sending viruses through email attachments
Deleting or damaging files on a computer system without permission
What is the potential impact of cybercrime on individuals?
A) Financial loss or loss of income
B) Legal benefits
C) Improved security awareness
D) Free access to software
Financial loss or loss of income
What is a major technique used by law enforcement to catch cybercriminals?
A) Use of wiretaps on phone lines
B) Keystroke monitoring software
C) Tracking IP addresses
D) All of the above
All of the above
What is a potential impact of cybercrime on national security?
A) Increased healthcare costs
B) Economic growth
C) National security concerns
D) Increased social media engagement
National security concerns
Which of the following is a prevention strategy for businesses to protect against cybercrime?
A) Ignoring cybersecurity policies
B) Investing in creator insurance
C) Avoiding government initiatives and policies
D) Reducing employee training on cybersecurity measures
Investing in creator insurance
What emotional impact can cybercrime have on individuals?
A) Emotional trauma
B) Increased happiness
C) Personal development
D) Increased job opportunities
Emotional trauma
What is the role of a Personal Information Controller?
A) Collects and processes personal information
B) Controls the storage and usage of personal information
C) Is responsible for reporting cybercrime
D) Manages the enforcement of data protection laws
Controls the storage and usage of personal information
Which of the following traits is typically associated with cybercriminals, according to Parker (1998)?
A) Curiosity
B) Kindness
C) Patience
D) Introversion
Curiosity
Which of the following rights of a data subject allows them to correct their information?
A) Right to Erasure
B) Right to Object
C) Right to Correct
D) Right to File a Complaint
Right to Correct
Which of these is a category of typical computer criminals, according to Forester and Morrison (1994)?
A) Professional criminals
B) Police officers
C) Internet service providers
D) Customers of a business
Professional criminals
Which of the following is an example of social media fraud?
A) Someone posting harmful content on social media
B) A hacker stealing personal data from a social media platform
C) A business using social media to sell fake products
D) All of the above
All of the above
What distinguishes hacking from cracking?
A) Hacking involves breaking into systems to steal data, while cracking is used for testing systems.
B) Hacking is illegal, while cracking is legal.
C) Cracking involves testing systems, while hacking involves exploration.
D) Hacking involves theft, while cracking involves exploration.
Hacking involves theft, while cracking involves exploration.
What is considered a “typical” cybercriminal based on Forester and Morrison (1994)?
A) A young hacker with limited skills
B) An experienced hacker from an overseas criminal organization
C) A loyal employee who becomes involved in cybercrime
D) A random person with no prior knowledge of computers
A loyal employee who becomes involved in cybercrime