Introduction Flashcards

1
Q

What is Cybercrime?

A

Cybercrime refers to criminal activities carried out using computers, networks, or other forms of Information and Communication Technology (ICT).

“Cybercrime is an evolving form of transnational crime” (UNODC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the broad categories of Cybercrime?

A
  1. The computer is the target of the crime (e.g., hacking).
  2. The computer is a weapon in the crime (e.g., identity theft).
  3. The computer is an accessory in the crime (e.g., storing illegal information).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the characteristics of Cybercrime?

A
  1. Involves specialized knowledge.
  2. No geographical boundaries.
  3. Takes place in a virtual world.
  4. Challenging to collect evidence.
  5. Potential for unimaginable magnitude of crime.
  6. Anonymity of perpetrators.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Cyberspace?

A

Cyberspace is a digital space where individuals transact, conduct business, and communicate in limitless ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who are the types of Cyber Criminals?

A
  1. Hackers.
  2. Social engineers.
  3. Phishers.
  4. Rogue employees.
  5. Ransom artists.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some reasons for the existence of Cybercrime despite Anti-Cybercrime Laws?

A
  1. Inherent vulnerability of networks.
  2. Large number of connected computers.
  3. Automation of illegal activities.
  4. Unregulated nature of the internet.
  5. Advancements in technology.
  6. Anonymity of users.
  7. Different laws across countries.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some strategies for Cybercrime Prevention?

A
  1. Keep software up-to-date.
  2. Uninstall unused software.
  3. Use reputable anti-virus programs.
  4. Avoid downloading from sharing sites.
  5. Don’t click links from unknown senders.
  6. Verify website legitimacy before sharing personal information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Hacking?

A

Hacking is the act of unauthorized breaking into a computer system or online account, compromising devices, systems, and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the types of Hackers?

A
  1. Black Hat Hackers - malicious intent.
  2. White Hat Hackers - ethical hacking.
  3. Grey Hat Hackers - expose vulnerabilities for common good.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Hacktivism?

A

Hacktivism is the use of technology to publicize a social, ideological, religious, or political message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Malware?

A

Malware is any software designed to harm or exploit a device or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the types of Malware?

A
  1. Viruses.
  2. Trojan horses.
  3. Worms.
  4. Spyware.
  5. Zombie/Botnets.
  6. Spam.
  7. Adware.
  8. Ransomware.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Denial-of-Service (DoS) Attacks?

A

DoS attacks flood a network with false requests to disrupt operations. DDoS attacks are launched from multiple systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Phishing?

A

Phishing is a cyber attack that lures victims into sharing private information or downloading malicious programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the types of Phishing?

A
  1. Spear phishing - targets specific individuals.
  2. Whaling - targets senior executives.
  3. SMiShing - fraudulent text messages.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is spear phishing?

A

Spear phishing is a type of phishing attack that uses malicious emails to target specific individuals or organizations to steal sensitive information or infect devices with malware.

17
Q

What is whaling?

A

Whaling is a type of social engineering attack that targets senior or C-level executives to steal money or information, or gain access to their computers for further cyberattacks.

18
Q

What is SMiShing?

A

SMiShing is the sending of fraudulent text messages to trick individuals into sharing sensitive data such as passwords, usernames, and credit card numbers.

19
Q

What is vishing?

A

Vishing is a voice phishing attack that uses fraudulent phone calls and voice messages to trick individuals into providing personal information.

20
Q

What is spoofing?

A

Spoofing is a technique where a cybercriminal disguises as a known or reputable source to engage with the target and access their systems or devices.

21
Q

What is domain spoofing?

A

Domain spoofing is a form of phishing where an attacker poses as a known business or person using a fake website or email domain to trick the victim.

22
Q

What is email spoofing?

A

Email spoofing uses falsified email addresses to target businesses and organizations, making recipients more likely to open malicious content.

23
Q

What is ARP spoofing?

A

ARP spoofing is a form of spoofing attack used to intercept data by tricking a device into sending messages to the hacker instead of the intended recipient.

24
Q

What are identity-based attacks?

A

Identity-driven attacks occur when a user’s credentials are hacked, and someone impersonates that user, making it challenging to distinguish between typical user behavior and that of the hacker.

25
Who is the ragids
Omar Ledama
26
27