Introduction Flashcards
What is Cybercrime?
Cybercrime refers to criminal activities carried out using computers, networks, or other forms of Information and Communication Technology (ICT).
“Cybercrime is an evolving form of transnational crime” (UNODC)
What are the broad categories of Cybercrime?
- The computer is the target of the crime (e.g., hacking).
- The computer is a weapon in the crime (e.g., identity theft).
- The computer is an accessory in the crime (e.g., storing illegal information).
What are the characteristics of Cybercrime?
- Involves specialized knowledge.
- No geographical boundaries.
- Takes place in a virtual world.
- Challenging to collect evidence.
- Potential for unimaginable magnitude of crime.
- Anonymity of perpetrators.
What is Cyberspace?
Cyberspace is a digital space where individuals transact, conduct business, and communicate in limitless ways.
Who are the types of Cyber Criminals?
- Hackers.
- Social engineers.
- Phishers.
- Rogue employees.
- Ransom artists.
What are some reasons for the existence of Cybercrime despite Anti-Cybercrime Laws?
- Inherent vulnerability of networks.
- Large number of connected computers.
- Automation of illegal activities.
- Unregulated nature of the internet.
- Advancements in technology.
- Anonymity of users.
- Different laws across countries.
What are some strategies for Cybercrime Prevention?
- Keep software up-to-date.
- Uninstall unused software.
- Use reputable anti-virus programs.
- Avoid downloading from sharing sites.
- Don’t click links from unknown senders.
- Verify website legitimacy before sharing personal information.
What is Hacking?
Hacking is the act of unauthorized breaking into a computer system or online account, compromising devices, systems, and networks.
What are the types of Hackers?
- Black Hat Hackers - malicious intent.
- White Hat Hackers - ethical hacking.
- Grey Hat Hackers - expose vulnerabilities for common good.
What is Hacktivism?
Hacktivism is the use of technology to publicize a social, ideological, religious, or political message.
What is Malware?
Malware is any software designed to harm or exploit a device or network.
What are the types of Malware?
- Viruses.
- Trojan horses.
- Worms.
- Spyware.
- Zombie/Botnets.
- Spam.
- Adware.
- Ransomware.
What are Denial-of-Service (DoS) Attacks?
DoS attacks flood a network with false requests to disrupt operations. DDoS attacks are launched from multiple systems.
What is Phishing?
Phishing is a cyber attack that lures victims into sharing private information or downloading malicious programs.
What are the types of Phishing?
- Spear phishing - targets specific individuals.
- Whaling - targets senior executives.
- SMiShing - fraudulent text messages.
What is spear phishing?
Spear phishing is a type of phishing attack that uses malicious emails to target specific individuals or organizations to steal sensitive information or infect devices with malware.
What is whaling?
Whaling is a type of social engineering attack that targets senior or C-level executives to steal money or information, or gain access to their computers for further cyberattacks.
What is SMiShing?
SMiShing is the sending of fraudulent text messages to trick individuals into sharing sensitive data such as passwords, usernames, and credit card numbers.
What is vishing?
Vishing is a voice phishing attack that uses fraudulent phone calls and voice messages to trick individuals into providing personal information.
What is spoofing?
Spoofing is a technique where a cybercriminal disguises as a known or reputable source to engage with the target and access their systems or devices.
What is domain spoofing?
Domain spoofing is a form of phishing where an attacker poses as a known business or person using a fake website or email domain to trick the victim.
What is email spoofing?
Email spoofing uses falsified email addresses to target businesses and organizations, making recipients more likely to open malicious content.
What is ARP spoofing?
ARP spoofing is a form of spoofing attack used to intercept data by tricking a device into sending messages to the hacker instead of the intended recipient.
What are identity-based attacks?
Identity-driven attacks occur when a user’s credentials are hacked, and someone impersonates that user, making it challenging to distinguish between typical user behavior and that of the hacker.