Global risks and resilience Flashcards
What is hacking?
Hacking refers to the process in which individuals with knowledge of computer coding use software to help break into computer security systems.
What are some threats to individuals and businesses related to hacking?
Threats include unauthorized access to private emails, alteration of school records, and ransomware attacks that lock computer systems until a payment is made.
What was the WannaCry cyber attack?
WannaCry was a cyber worm attack in May 2017 that affected 200,000 computers in 99 countries, locking users out of their systems until they paid a ransom.
What is black hat hacking?
Black hat hacking refers to people who try to break into systems to damage them or exploit them using ‘ransomware’ that locks a person’s computer until they pay a fine.
How has cybercrime grown in recent years?
Cybercrime has increased significantly, with estimates suggesting it will cost 2 trillion dollars by 2019. It has become a major problem for individual governments to address, often requiring international cooperation.
What is identity theft?
Identity theft occurs when a hacker steals another person’s identity, generally online, to use for their own profit. It may involve the theft of bank and/or credit card details.
How prevalent is identity theft?
According to C6 Intelligence, over 300,000 identities are being sold daily on the Dark Web.
What is stalking in the context of online security?
Stalking occurs when a person observes, follows and tracks another person and this attention is unwanted and often obsessive. In the online context, it can involve using stolen identities on social media or dating sites.
What is surveillance?
Surveillance is the monitoring of the behavior of individuals and groups. Different groups and national governments see this as a way of defining risks to national security and also of detecting criminal behavior.
What are some examples of everyday surveillance?
Examples include CCTV cameras in urban centers, traffic cameras on major roads, and location tracking through mobile phones.
What controversy surrounds government surveillance?
Government agencies have been accused of collecting excessive information on citizens, including phone tapping and email monitoring, which may infringe on individual rights and international law.
What is a whistle-blower?
A whistle-blower is a person who reveals secrets because of what he or she believes is illegal behavior. Examples include Edward Snowden and Chelsea Manning.
What is WikiLeaks?
WikiLeaks is an organization founded by Julian Assange in 2006 that collates information from other sources and releases them on the internet, often revealing classified or sensitive information.
What are the benefits and risks of computer technology?
Enables communication with groups worldwide and access to information. But makes us vulnerable to security hackers who want to access our information. Governments storing large amounts of information are also vulnerable to hacker threats.
What happened during the 2016 US presidential election regarding Russian hackers?
Russian hackers accessed the email of the Democratic National Committee and Hillary Clinton’s private emails. They had access to Clinton’s emails since 2013, particularly her correspondence with adviser Sidney Blumenthal.
What are some consequences of email hacking?
Hackers gain insight into a person’s intimate thoughts and transactions. Victims are often unaware it has happened. In some cases, students or parents have hacked school records to alter grades illegally.
Describe the WannaCry cyber attack of May 2017.
WannaCry was a cyber worm that locked Microsoft Windows computers, affecting 200,000 computers in 99 countries. It impacted global users like FedEx, Nissan, Russia’s Rail and Interior ministry, Britain’s NHS, Deutsche Bahn, and Spain’s Telefónica. Users couldn’t access their material until paying a ransom. The virus likely originated from North Korea.
What is the estimated cost of cybercrime by 2019?
Cybercrime is estimated to cost 2 trillion dollars by 2019.
Why do governments struggle with cybercrime?
Crimes are often committed beyond their borders, requiring increased cooperation between authorities in different countries and coordination by organizations like Interpol.
How do criminals obtain information for identity theft?
Criminals gain information from stolen or mislaid cards, or by hacking email accounts. They then sell this information, allowing others to apply for credit cards or make purchases using the stolen identity.
What is the Dark Web’s role in identity theft?
C6 Intelligence estimates that over 300,000 identities are being sold daily on the Dark Web.
How can using the same password for multiple accounts increase risk?
It makes all accounts vulnerable if one is hacked. Hackers can send bogus emails requesting money transfers in the person’s name to their entire address book.
How is stalking related to identity theft?
Hackers use stolen identities on social media and dating sites to make contacts and gain more information about people, sometimes leading to stalking activities.
How do banks and finance companies contribute to surveillance?
They sell information about their clients, helping companies target their marketing activities. Financial transactions reveal consumer behavior.