Dangers of Computer Crime Flashcards

1
Q

Define social engineering

A

Any attempt to manipulate someone into revealing confidential information. This is usually done by someone posing as a person who would possibly ask for the information legitimately.
ex. a password or account number which can be used to impersonate them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define malware

A

A general term used to describe software specifically designed to install itself without the user’s knowledge and to affect or harm a computer system. It is software written with negative intentions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define pharming

A

A scamming practice where a user is automatically redirected to a fake website even if they type in the correct URL of the official site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Discuss ways to protect oneself from pharming

A

1) Take note of redirection warnings
2) Check whether the site is secure
3) Make sure that one’s anti-soyware software is up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define click-jacking

A

An attack in which a site appears to do one thing but the user’s clicks are actually redirected to do something else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Discuss the ways to protect oneself from click-jacking

A

1) Add ons can be installed on the browser

2) Sever programs can be installed to protect users on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define spoofing

A

The changing of an email header so that the email appears to come from a different source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Discuss how to protect oneself from spoofing

A

Make sure the email comes from a trusted sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define spyware

A

Any technique or software that tries to monitor and track the way a user uses their computer, once it has done this, the user’s information is sent to a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Discuss ways to protect oneself from spyware

A

1) Install anti-spyware software

2) Do not fall victim for any internet hoaxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define keylogger

A

A type of software that records the user’s keystrokes as they type in an attempt to discover their personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Discuss ways to protect oneself from keyloggers

A

1) Make use of a firewall
2) Install a password manager
3) Keep user’s computer systems updated
4) Consider anti-malware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define computer virus

A

A program that is written to disrupt the normal functioning of a computer. Most viruses activate when you open or run an infected file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Discuss ways to protect oneself from computer viruses

A

1) Install anti-virus software

2) Do not open unrecognized or suspicious emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define trojan

A

A disruptive program disguised as a useful application. It relies on one to activate it before it can operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Discuss how one can protect themselves from trojans

A

Do not run any programs unless you are sure it is safe to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define ransomware

A

Malware that makes data unavailable until you pay the hacker a ransom fee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Discuss how one can protect themselves from ransomware

A

Install anti-virus software and keep it updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define adware

A

Software that downloads itself onto the user’s computer and bombards them with adverts that pop up whenever they are connected to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Discuss ways one can protect themselves from adware

A

1) Install anti-malware software

2) By not clicking on any unknown links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define scams

A

A fraudulent scheme used by a malicious person to obtain money or something of value from someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Discuss ways to protect oneself from scams

A

1) Check sources for reliability
2) Do not forward a scam to others
3) Never take any actions suggested in a scam message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

List the types of computer-related crimes

A

1) Theft of computer hardware
2) Software theft
3) Bandwidth theft
4) Identity theft
5) Misuses of personal information
6) Theft of time and services
7) Internet-related fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define theft of computer hardware

A

The theft of physical hardware components, which includes internal components, such as RAM and graphical cards, external components such as a keyboard or mouse, as well as theft of a user’s laptop or smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Discuss ways to protect oneself from theft of computer hardware

A

1) Never leave one’s computer or mobile device unattended in a public place
2) Use passwords as a security method
3) Use a cable to lock one’s equipment to a table or desk in the office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define theft of software

A

The use and distribution of software obtained by illegal methods. This including a CD or DVD that contains software, as well as downloading illegal software from the internet (piracy)

27
Q

Discuss ways to stay clear of software theft

A

1) Do not copy, duplicate or distribute any software without a copyright license
2) Do not download and use illegal software from the internet
3) Do not lend software so that can illegal copy can be made

28
Q

Define bandwidth theft

A

The use of bandwidth without paying for it.

29
Q

Discuss the safety precautions to prevent bandwidth theft

A

1) Have a good password policies

2) Be careful when installing software from the internet, as it might be malware

30
Q

Discuss some examples of bandwidth theft

A

1) People steal bandwidth in many ways, which include stealing usernames and passwords and connections that are not owned by them.
2) Bandwidth theft can also occur when one is connected to an unprotected network.
3) Hotlinking

31
Q

Define hotlinking

A

A type of bandwidth theft, when someone takes a file or video from their website and links it to your website. This is problematic as each time a user clicks on the link in order to download the file or view the video, your bandwidth will be used.

32
Q

Define identity theft

A

Stealing data that can be used to pretend that a person is someone else. Identity theft can range from stealing any personal information such as the user’s name, address, favourite food, or more official information such as the user’s ID number, telephone number, etc.

33
Q

Discuss some examples of identity theft

A

The stolen information can be used to take over the user’s accounts on websites like Twitter, Instagram, etc, so as to post messages or use these services whilst pretending to be the user. Personal information, such as identity numbers, can be used to impersonate someone (i.e. steal their identity). This allows the thief to open accounts, take out loans and buy things in the person’s name.

34
Q

Discuss how to protect oneself from identity theft

A

1) Do not share your sensitive information unnecessarily
2) Protect information using secure password
3) Be selective with the websites on which to share your information

35
Q

Define misuse of personal information

A

Applications you use record and store your activity when using the app. This information, displaying your interests, is then sold to advertisers, which is later used to customise your experience on app using ads that atain to your interests

36
Q

Define theft of time and services

A

Theft of time refers to a person receiving payment from their employer for work that the employee did not do. This is usually because the person is busy with non-work-related activities during work time. Theft of services refers to the person using company equipment, such as a computer or the internet, for personal matters

37
Q

Define ‘phishing and email spoofing’

A

Attacks to try obtain sensitive information, such as usernames, passwords and banking details, by sending emails to users that look like official emails. These emails will either directly request the sensitive information, or redirect users to an offical-looking website where their information will be stolen

38
Q

Discuss ways to protect oneself from ‘phishing and email spoofing’

A

1) Never send sensitive information, such as passwords and usernames over email
2) Ensure that the email and domain name are correct for any email that looks suspicious

39
Q

Define harassment

A

Being continously bothered by messages or data that one does not want to receive, or data that spreads false and potentially harmful information about the victim to others

40
Q

List examples of harassment

A

1) Cyberstalking
2) Spam
3) Uploading unauthorized pictures on the web
4) Cyberbullying

41
Q

Define cyberstalking

A

Using the internet to stalk or harass someone

42
Q

Define spam in terms of harassment

A

Sending someone many unwanted and sometimes embarrassing adverts through email

43
Q

Define cyberbullying

A

When someone is bullied online. This can often take the form of Facebook posts, Twitter tweets, instant messaging chats, etc.

44
Q

Define cyber-attacks

A

An attack on the infrastructure of the web itself

45
Q

List examples of cyber-attacks

A

1) Business cyber-attacks
2) Web cyber-attacks
3) Cyberterrorism
4) Denial of Service Attack (DoS) or Distributed Denial of Service Attack (DDoS)
5) Spoofing attacks
6) Sniffer attacks

46
Q

Define DOS/DDOS (Denial of Service)

A

The use of compromised computers to flood a server with requests for information. The attack can be regarded as successful if the server becomes so overwhelmed that normal users cannot connect to the system

47
Q

Define cyberterrorism

A

Attacks that only occurs in parts of a country’s IT infrastructure

48
Q

Define spoofing attacks

A

Masking the attacker and making it seem as if they are a legitimate user. This is done by using false data to connect to the network

49
Q

Define sniffer attacks

A

Checking the data packets sent over the network. Hackers use sniffer applications to analyze the network and access all unencrypted data being transmitted

50
Q

Define a ‘bot’

A

Short for robot, is a software application that allows the user to automate tasks and actions. On the internet, they are normally used to analyze and gather file information.

51
Q

Give an example of a ‘bot’

A

Web crawlers, which are bots that gather, analyze and index data that can be used by search engines, such as Google

52
Q

Define ‘malware bots’

A

Infect the user’s computer and automatically perform malicious actions, such as gathering keystrokes, obtaining financial information, gathering passwords, or opening back doors on the infected computer

53
Q

Define a ‘zombie’

A

Malware bots that completely take over the user’s computer, allowing the hacker to take control. Hackers can use zombie computers for a wide variety of applications; including launching DoS attacks and sending spam emails in order to spread the malware

54
Q

List ways to protect one’s computer and self from computer crime

A

1) Protecting oneself against computer crime
2) Software needed to help protect one’s computer
3) Precautions to take

55
Q

Discuss how one can protect themselves against computer crime

A

Use common sense: ABC
Assume nothing
Believe no one
Check everything

56
Q

Define antivirus software

A

Computer programs that scan computer files for viruses and eliminate them.

57
Q

How does antivirus software work?

A

The software uses virus definitions to detect the signs or specific traces that a specific virus leaves in the computer system. The software needs to be updated regularly so that it can detect new viruses

58
Q

Give examples of antivirus software

A

1) Norton
2) AVG
3) Avast
4) Nod32
5) Mcafee
6) Kaspersky
7) Microsoft Defender (installed with Windows 10 devices)

59
Q

State the software needed to help protect one’s computer from computer crime

A

1) Firewall software

2) Anti-spyware software

60
Q

Define firewall software

A

Software that allows a user to control which programs can access the internet and protects a user’s computer or network from unauthorized access. Most operating systems, including Windows 10, come with a built in firewall

61
Q

Define anti-spyware software

A

Software that detects spyware has been installed on a computer. This software needs to be updated so that new forms of spyware can be detected

62
Q

What is Windows Defender?

A

The basic antivirus program that comes equipped with Windows 10. This program is sufficient to protect a user against most threats. However, an antivirus application with more features might be needed for more serious threats. Windows also comes equipped with a basic firewall, but this might not be strong enough to protect one’s computer against powerful malware.

63
Q

List the precautions needed to protect one from computer crimes

A

1) Use a secure password
2) Pay careful attention to the websites and links you open
3) Do not share your sensitive information unnecessarily
4) Do not open suspicious emails
5) Do not download suspicious programs or attachments
6) Keep antivirus application up to date
7) Keep all software up to date
8) Use two-factor authentication whenever possible