Cyberspace Network Security And Data Transfer Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Cybercrime?

A

Cybercrime is using a computer to commit a crime

This includes activities such as viruses, credit card theft, and theft of company data. People involved in cybercrime are known as cyber criminals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Hacking?

A

Unauthorized access to a computer or account

Hacking is a primary threat in cybercrime, involving breaking into systems to access data unlawfully.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Cyber Stalking?

A

Using digital technologies to harass an individual or organization

It often involves repeated, unwanted communication or threats through electronic means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Data Theft?

A

Theft of personal information or company data

This can include stealing sensitive information from databases or personal accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Denial of Service?

A

An attack that makes a computer or network unavailable

This is often achieved by overwhelming the target with traffic or requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Digital Forgery?

A

Creating fake digital documents or signatures

This can include altering legitimate documents or creating entirely fictitious ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Cyber Defamation?

A

False statements made online that harm someone’s reputation

This can involve spreading lies or malicious rumors about individuals or organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Spamming?

A

Sending unsolicited messages, usually in bulk

This often involves advertising or phishing attempts sent via email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Phishing?

A

Attempting to obtain sensitive information by masquerading as a trustworthy entity

Phishing often occurs through deceptive emails or websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is cybersecurity?

A

A collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is phishing?

A

A cyber threat involving fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does spamming refer to?

A

The act of sending unsolicited messages, often for advertising purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is malware?

A

Malicious software designed to harm, exploit, or otherwise compromise a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define hacking.

A

The act of attempting to gain unauthorized access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who is a hacker?

A

A person who gains unauthorized access to a computer with criminal intentions of corrupting or stealing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is defamation in the context of cybersecurity?

A

The act of damaging someone’s reputation through false statements, often facilitated by digital means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is digital forgery?

A

The creation of false digital documents or alterations of existing documents for deceptive purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is cyberstalking?

A

The use of the internet or other electronic means to harass or stalk an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is data theft?

A

The unauthorized acquisition of sensitive or confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is denial of service?

A

A cyber attack aimed at making a machine or network resource unavailable to its intended users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or False: Hacking is always associated with malicious activity.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fill in the blank: Cybersecurity aims to protect against _______.

A

[cyber threats]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are common techniques used by hackers to gain access to networks?

A

Common techniques include:
* Use of Worms or scripts
* Unauthorized remote connection
* Denial of service attack

These techniques exploit vulnerabilities in network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a key logger program?
A key logger program records the sequence of every key press that a user completes on their keyboard. ## Footnote Hackers use this to discover legitimate users' usernames and passwords.
26
Define pornography.
Pornography is material such as books, images, magazines, or videos that show sexual or erotic behaviour. ## Footnote It is present on the internet in various forms and may include illegal acts.
27
What is cyber pornography?
Cyber pornography is a criminal offence that is classed as causing harm to people. ## Footnote It has become a serious problem due to easy distribution over the internet.
28
What are the consequences of possessing illegal pornography?
Individuals found in possession or with evidence of accessing illegal material can be prosecuted. ## Footnote This includes material that shows illegal acts.
29
What is cyber stalking?
Cyber stalking is the use of a network or electronic communications to harass or scare someone. ## Footnote It can involve monitoring the target and may include characteristics like false accusations and threats.
30
List the characteristics of cyber stalking.
Characteristics include: * False accusations * Threats * Identity theft * Destruction of personal data * Exploitation (sexual or otherwise) * Progression to physical stalking ## Footnote Cyber stalking can occur through various communication forms.
31
What is data theft?
Data theft is the act of stealing data from an unknowing victim or organization to obtain confidential information. ## Footnote This criminal activity is increasing for both individuals and businesses.
32
What are some security precautions businesses take against data theft?
Businesses often use: * Firewalls * Network protection measures ## Footnote These precautions aim to prevent unauthorized access to sensitive data.
33
What is a denial of service attack?
A denial of service attack aims to make a computer or network resource unavailable to its intended users. ## Footnote This can disrupt services by overwhelming systems with requests.
34
What is digital forgery?
Digital forgery involves altering an image or document to make it appear as an original. ## Footnote This act is considered a crime.
35
What is defamation in the context of cyber activities?
Defamation is sharing false information that harms an individual's reputation. ## Footnote This can occur through various digital platforms.
36
What is the purpose of monitoring activities in an organization?
To ensure that all authorized users act in the best interests of the company. ## Footnote Monitoring helps prevent unauthorized access and data theft.
37
What is data theft?
The act of stealing sensitive data for profit or ethical reasons. ## Footnote It can also involve sharing stolen data, commonly referred to as whistleblowing.
38
What is a Denial of Service (DoS) attack?
A web server's inability to service clients' requests due to overwhelming traffic. ## Footnote This can happen during high demand or as a result of deliberate attacks.
39
What is a Distributed Denial of Service (DDoS) attack?
An attack where requests for a target website are sent from multiple infected computers. ## Footnote Attackers hijack these computers to flood the target with requests.
40
What is digital forgery?
The creation of a copy of a document or image with the intent to profit from it. ## Footnote This can involve altering documents misleadingly, such as passports.
41
What is defamation?
The communication of false information that damages a person's or business's reputation. ## Footnote Cyber defamation occurs through the internet.
42
Fill in the blank: Cyber defamation is the use of the internet to share _______.
false information. ## Footnote This can occur through social media or other online platforms.
43
What are some reasons hackers might target a website?
* To make a political statement * Trolling for entertainment * Blackmail purposes ## Footnote These motivations can lead to various types of cyber attacks.
44
True or False: Digital forgery can involve altering a video or image to implicate someone in a crime.
True. ## Footnote This includes altering personal identification documents.
45
What might cause a web server to be unable to send a requested page to a user?
Receiving large numbers of requests almost simultaneously. ## Footnote This can overwhelm the server’s capacity.
46
What is spam?
Spam is an email or other electronic message that is sent to a person who has not requested it.
47
What do many email providers do with spam messages?
Many email providers filter spam messages into junk folders for their users.
48
Who are dpammers?
Dpammers are people who bulk send unsolicited messages to large numbers of internet users.
49
What is the relation between spam and phishing?
Sending spam is sometimes the first step in a phishing campaign, hoping that a recipient will respond to a bogus email.
50
Define phishing.
Phishing is a malicious way of obtaining sensitive information such as usernames, passwords, and credit card details.
51
How is phishing typically executed?
Phishing is often done via email by disguising it as a trustworthy source.
52
What type of information do phishing attempts usually seek?
Phishing attempts usually seek private information, such as bank account details or passwords.
53
Why is phishing still effective despite being an old crime?
Phishing is still effective because some emails sent by criminals can be very convincing, including elements like the company logo or a working phone number.
54
What is malware?
Malware is software designed to gain unauthorized access to computer systems or to cause damage.
55
Name a type of malware.
Types of malware include: * Virus * Trojan * Keylogger * Spyware * Ransomware
56
What does a computer virus do?
A computer virus is a code that can replicate itself and infect other computers.
57
What is a Trojan?
A Trojan is a type of malware that deceives users into thinking it is legitimate software.
58
What is a keylogger?
A keylogger is a type of malware that records keystrokes made by a user.
59
What is spyware?
Spyware is software that secretly monitors user activity and collects personal information.
60
What is ransomware?
Ransomware is malware that encrypts a user's data and demands payment for its release.
61
What is a virus?
A virus is a type of malicious software that can infect a computer, potentially causing damage or stealing information. ## Footnote Viruses can spread through various means, including email attachments and infected downloads.
62
How can anti-virus software protect against viruses?
Anti-virus software scans a computer regularly for potential threats and needs to be updated regularly to protect against new viruses. ## Footnote Regular updates are crucial for anti-virus software to remain effective.
63
What is a Trojan horse?
A Trojan horse is a program that performs a normal process while also executing a harmful process at the same time. ## Footnote Trojans are often disguised as legitimate software to trick users into opening them.
64
What damage can Trojan horses do to a computer?
Trojan horses can delete data files and rearrange desktop layouts. ## Footnote Some Trojans may also allow unauthorized access to secure files.
65
What is a worm in the context of computer viruses?
A worm is a type of virus that spreads itself via network connections without needing a host program or file to replicate. ## Footnote Worms can significantly slow down computer systems by consuming processing power.
66
True or False: A worm requires a host program to replicate.
False ## Footnote Worms are stand-alone programs that do not need a host to spread.
67
Fill in the blank: _______ can allow a hacker access to a system without a username and password.
Trojan horse ## Footnote Hackers may create Trojan horse programs for unauthorized data access.
68
What is spyware?
Spyware is a type of malware designed to gather information about a person or organization without their knowledge. ## Footnote Spyware can track user activities and collect sensitive information.