lesson 2.1-2.2 Flashcards

1
Q

Stands for malicious software

A

MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of malware

A

COMPUTER WORM
TROJAN HORSE
COMPUTER VIRUS
SPYWARE
ADWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is a dangerous computer program that replicates itself through a network.

A

COMPUTER WORM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Some _____ delete files, others disrupt the network function.

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is usually spread through email and running of attachments from suspicious sources.

A

COMPUTER WORM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It spreads by exploiting weaknesses in operating systems

A

COMPUTER WORM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A malware fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user’s consent.

A

TROJAN HORSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It can disable the computer’s defenses, opening it to unauthorized entry.

A

TROJAN HORSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It can erase data, can corrupt files, allow access to computer

A

TROJAN HORSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is a program that duplicates itself and then infects the computer. It spreads like a biological virus.

A

COMPUTER VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It can be transferred by the use of removable storage media devices.

A

COMPUTER VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Damages may be mild to severe.

A

COMPUTER VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a software or computer program that connect itself to another software or computer program to harm computer system

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spreading rate of ______ are moderate.

A

viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The main objective of ___ to modify the information.

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

replicate itself to cause slow down the computer system.

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

While spreading rate of ______are faster than virus and Trojan horse.

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The main objective of_____ to eat the system resources.

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

rather than replicate capture some important information about a computer system or a computer network

A

trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

the spreading rate of _______ is slow in comparison of both virus and worms.

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The main objective of ______ to steal the information

A

trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A computer program that is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the user.

A

SPYWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It can monitor and collect information about the user’s internet habits and practices.

A

SPYWARE

24
Q

It can also affect the performance and setting of the computer.

A

SPYWARE

25
Q

A program designed to send you advertisements, mostly pop-ups.

A

ADWARE

26
Q

unwanted email mostly from bots or advertisers. It can be used to send malware.

A

SPAM

27
Q

types of spam

A

EMAIL SPAM
EMAIL SPOOFING

28
Q

AKA Junk mail

A

EMAIL SPAM

29
Q

Usually unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients.

A

EMAIL SPAM

30
Q

It is a deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source which is usually someone you know.

A

EMAIL SPOOFING

31
Q

It is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source.

A

PHISHING

32
Q

It is usually done through emails or using popular entity such as Microsoft, Yahoo, Google, Amazon, and financial institutions.

A

PHISHING

33
Q

This is a person who is able to enter and control other people’s computer without authorization.

A

HACKER

33
Q

Usually vandalizes the victims’ website, steals personal information, obtains intellectual property, and performs credit card fraud.

A

HACKER

34
Q

Firewalls are able to prevent entry by ______.

A

hackers

35
Q

IT IS THE ILLEGAL ACTIVITIES OR OFFENCES THAT ARE COMMITED THROUGH THE USE OF INTERNET AND TELECOMMUNICATION NETWORKS SUCH AS COMPUTERS, MOBILE PHONES ETC.

A

CYBER CRIME

36
Q

EXCHANGING OR SPREADING FAKE MESSAGES WITH THE AIM OF DISRUPTING THE PRIVACY OF A PERSON OR TRYING TO THREATEN THE NATIONAL SECURITY THROUGH INTERNET OR SOCIAL MEDIA ARE DANGEROUS__________

A

CYBER CRIMES

37
Q

TYPES OF CYBER CRIME

A

cyber bullying
cyber stalking
identity theft
sexting

38
Q

REPEATED HARASSMENT, MISTREATMENT, OR MAKING FUN OF ANOTHER PERSON ONLINE THROUGH THE USE OF COMPUTERS, CELL PHONES, AND OTHER ELECTRONIC DEVICES.

A

CYBERBULLYING

39
Q

CAN WORK IN THE SAME WAY AS BULLYING IN THE PLAYGROUND; THEVICTIMFEELSFRIGHTENEDAND ALONE, WHILE THE BULLY TRIES TO HIDE FROM BEING caught.

A

CYBERBULLYING

40
Q

THREATENING
EMAILS

A

CYBERBULLYING

41
Q

REPEATED TEXT MESSAGES TO CELLPHONE

A

cyberbullying

42
Q

FORWARDING PRIVATE MESSAGES, PICTURES, ETC.

A

cyberbullying

43
Q

IS THE USE OF THE INTERNET OR OTHER ELECTRONIC MEANS TO STALK OR HARASS AN INDIVIDUAL, A GROUP OF INDIVIDUALS, OR AN ORGANIZATION.

A

CYBER STALKING

44
Q

INTENT IS TO HARM THEIR INTENDED VICTIM USING THE ANONYMITY AND UNTRACEABLE DISTANCE OF TECHNOLOGY.

A

CYBER STALKING

45
Q

FALSE ACCUSATIONS: MANY _______ TRY TO DAMAGE THE REPUTATION OF THEIR VICTIM AND TURN OTHER PEOPLE AGAINST THEM. THEY POST FALSE INFORMATION ABOUT THEM ON WEBSITES. THEY MAY SET UP THEIR OWN WEBSITES, BLOGS OR USER PAGES FOR THIS PURPOSE. THEY POST ALLEGATIONS ABOUT THE VICTIM TO NEWSGROUPS, CHAT ROOMS, OR OTHER SITES THAT ALLOW PUBLIC CONTRIBUTIONS.

A

CYBERSTALKERS

46
Q

ATTEMPTS TO GATHER INFORMATION ABOUT THE VICTIM.

A

CYBER STALKING

47
Q

______ MAY APPROACH THEIR VICTIM’S FRIENDS, FAMILY, AND WORK COLLEAGUES TO OBTAIN PERSONAL INFORMATION. THEY MAY ADVERTISE FOR INFORMATION ON THE INTERNET, OR HIRE A PRIVATE DETECTIVE.

A

CYBERSTALKERS

48
Q

MONITORING THEIR TARGET’S ONLINE ACTIVITIES AND ATTEMPTING TO TRACE THEIR IP ADDRESS IN AN EFFORT TO GATHER MORE INFORMATION ABOUT THEIR VICTIMS.

A

CYBER STALKERS

49
Q

ENCOURAGING OTHERS TO HARASS THE VICTIM. MANY ________TRY TO INVOLVE THIRD PARTIES IN THE HARASSMENT. THEY MAY CLAIM THE VICTIM HAS HARMED THE STALKER OR HIS/HER FAMILY IN SOME WAY, OR MAY POST THE VICTIM’S NAME AND TELEPHONE NUMBER IN ORDER TO ENCOURAGE OTHERS TO JOIN THE PURSUIT.

A

CYBER STALKERS

50
Q

FALSE VICTIMIZATION. THE _______ WILL CLAIM THAT THE VICTIM IS HARASSING HIM/HER. THIS PHENOMENON HAS BEEN NOTED IN A NUMBER OF WELL-KNOWN CASES.

A

CYBERSTALKER

51
Q

ATTACKS ON DATA AND EQUIPMENT. THEY MAY TRY TO DAMAGE THE VICTIM’S COMPUTER BY SENDING VIRUSES.

A

CYBERSTALKER

52
Q

ORDERING GOODS AND SERVICES. THEY ORDER ITEMS OR SUBSCRIBE TO MAGAZINES IN THE VICTIM’S NAME. THESE OFTEN INVOLVE SUBSCRIPTIONS TO PORNOGRAPHY OR ORDERING SEX TOYS THEN HAVING THEM DELIVERED TO THE VICTIM’S WORKPLACE.

A

CYBERSTALKER

53
Q

CRIMINAL EVENT THAT OCCURS WHEN ONE PERSON TAKES PERSONAL INFORMATION FROM ANOTHER WITHOUT HIS OR HER PERMISSION OR KNOWLEDGE AND USES IT TO :
OPEN NEW CREDIT CARD ACCOUNTS
PURCHASE VEHICLES
APPLIES LOANS

A

IDENTITY THEFT

54
Q

IT IS USUALLY REFERSTO SENDING AND RECEIVING RUDE MESSAGES OR VIDEOS OF:
NAKED PICTURES
UNDERWEAR SHOTS
ANY SEXUAL TEXTS, IMAGES OR VIDEOS

A

sexting