lesson 2.1-2.2 Flashcards
Stands for malicious software
MALWARE
Types of malware
COMPUTER WORM
TROJAN HORSE
COMPUTER VIRUS
SPYWARE
ADWARE
It is a dangerous computer program that replicates itself through a network.
COMPUTER WORM
Some _____ delete files, others disrupt the network function.
worms
It is usually spread through email and running of attachments from suspicious sources.
COMPUTER WORM
It spreads by exploiting weaknesses in operating systems
COMPUTER WORM
A malware fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user’s consent.
TROJAN HORSE
It can disable the computer’s defenses, opening it to unauthorized entry.
TROJAN HORSE
It can erase data, can corrupt files, allow access to computer
TROJAN HORSE
It is a program that duplicates itself and then infects the computer. It spreads like a biological virus.
COMPUTER VIRUS
It can be transferred by the use of removable storage media devices.
COMPUTER VIRUS
Damages may be mild to severe.
COMPUTER VIRUS
is a software or computer program that connect itself to another software or computer program to harm computer system
Virus
Spreading rate of ______ are moderate.
viruses
The main objective of ___ to modify the information.
virus
replicate itself to cause slow down the computer system.
worms
While spreading rate of ______are faster than virus and Trojan horse.
worms
The main objective of_____ to eat the system resources.
worms
rather than replicate capture some important information about a computer system or a computer network
trojan horse
the spreading rate of _______ is slow in comparison of both virus and worms.
Trojan horse
The main objective of ______ to steal the information
trojan horse
A computer program that is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the user.
SPYWARE
It can monitor and collect information about the user’s internet habits and practices.
SPYWARE
It can also affect the performance and setting of the computer.
SPYWARE
A program designed to send you advertisements, mostly pop-ups.
ADWARE
unwanted email mostly from bots or advertisers. It can be used to send malware.
SPAM
types of spam
EMAIL SPAM
EMAIL SPOOFING
AKA Junk mail
EMAIL SPAM
Usually unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients.
EMAIL SPAM
It is a deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source which is usually someone you know.
EMAIL SPOOFING
It is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source.
PHISHING
It is usually done through emails or using popular entity such as Microsoft, Yahoo, Google, Amazon, and financial institutions.
PHISHING
This is a person who is able to enter and control other people’s computer without authorization.
HACKER
Usually vandalizes the victims’ website, steals personal information, obtains intellectual property, and performs credit card fraud.
HACKER
Firewalls are able to prevent entry by ______.
hackers
IT IS THE ILLEGAL ACTIVITIES OR OFFENCES THAT ARE COMMITED THROUGH THE USE OF INTERNET AND TELECOMMUNICATION NETWORKS SUCH AS COMPUTERS, MOBILE PHONES ETC.
CYBER CRIME
EXCHANGING OR SPREADING FAKE MESSAGES WITH THE AIM OF DISRUPTING THE PRIVACY OF A PERSON OR TRYING TO THREATEN THE NATIONAL SECURITY THROUGH INTERNET OR SOCIAL MEDIA ARE DANGEROUS__________
CYBER CRIMES
TYPES OF CYBER CRIME
cyber bullying
cyber stalking
identity theft
sexting
REPEATED HARASSMENT, MISTREATMENT, OR MAKING FUN OF ANOTHER PERSON ONLINE THROUGH THE USE OF COMPUTERS, CELL PHONES, AND OTHER ELECTRONIC DEVICES.
CYBERBULLYING
CAN WORK IN THE SAME WAY AS BULLYING IN THE PLAYGROUND; THEVICTIMFEELSFRIGHTENEDAND ALONE, WHILE THE BULLY TRIES TO HIDE FROM BEING caught.
CYBERBULLYING
THREATENING
EMAILS
CYBERBULLYING
REPEATED TEXT MESSAGES TO CELLPHONE
cyberbullying
FORWARDING PRIVATE MESSAGES, PICTURES, ETC.
cyberbullying
IS THE USE OF THE INTERNET OR OTHER ELECTRONIC MEANS TO STALK OR HARASS AN INDIVIDUAL, A GROUP OF INDIVIDUALS, OR AN ORGANIZATION.
CYBER STALKING
INTENT IS TO HARM THEIR INTENDED VICTIM USING THE ANONYMITY AND UNTRACEABLE DISTANCE OF TECHNOLOGY.
CYBER STALKING
FALSE ACCUSATIONS: MANY _______ TRY TO DAMAGE THE REPUTATION OF THEIR VICTIM AND TURN OTHER PEOPLE AGAINST THEM. THEY POST FALSE INFORMATION ABOUT THEM ON WEBSITES. THEY MAY SET UP THEIR OWN WEBSITES, BLOGS OR USER PAGES FOR THIS PURPOSE. THEY POST ALLEGATIONS ABOUT THE VICTIM TO NEWSGROUPS, CHAT ROOMS, OR OTHER SITES THAT ALLOW PUBLIC CONTRIBUTIONS.
CYBERSTALKERS
ATTEMPTS TO GATHER INFORMATION ABOUT THE VICTIM.
CYBER STALKING
______ MAY APPROACH THEIR VICTIM’S FRIENDS, FAMILY, AND WORK COLLEAGUES TO OBTAIN PERSONAL INFORMATION. THEY MAY ADVERTISE FOR INFORMATION ON THE INTERNET, OR HIRE A PRIVATE DETECTIVE.
CYBERSTALKERS
MONITORING THEIR TARGET’S ONLINE ACTIVITIES AND ATTEMPTING TO TRACE THEIR IP ADDRESS IN AN EFFORT TO GATHER MORE INFORMATION ABOUT THEIR VICTIMS.
CYBER STALKERS
ENCOURAGING OTHERS TO HARASS THE VICTIM. MANY ________TRY TO INVOLVE THIRD PARTIES IN THE HARASSMENT. THEY MAY CLAIM THE VICTIM HAS HARMED THE STALKER OR HIS/HER FAMILY IN SOME WAY, OR MAY POST THE VICTIM’S NAME AND TELEPHONE NUMBER IN ORDER TO ENCOURAGE OTHERS TO JOIN THE PURSUIT.
CYBER STALKERS
FALSE VICTIMIZATION. THE _______ WILL CLAIM THAT THE VICTIM IS HARASSING HIM/HER. THIS PHENOMENON HAS BEEN NOTED IN A NUMBER OF WELL-KNOWN CASES.
CYBERSTALKER
ATTACKS ON DATA AND EQUIPMENT. THEY MAY TRY TO DAMAGE THE VICTIM’S COMPUTER BY SENDING VIRUSES.
CYBERSTALKER
ORDERING GOODS AND SERVICES. THEY ORDER ITEMS OR SUBSCRIBE TO MAGAZINES IN THE VICTIM’S NAME. THESE OFTEN INVOLVE SUBSCRIPTIONS TO PORNOGRAPHY OR ORDERING SEX TOYS THEN HAVING THEM DELIVERED TO THE VICTIM’S WORKPLACE.
CYBERSTALKER
CRIMINAL EVENT THAT OCCURS WHEN ONE PERSON TAKES PERSONAL INFORMATION FROM ANOTHER WITHOUT HIS OR HER PERMISSION OR KNOWLEDGE AND USES IT TO :
OPEN NEW CREDIT CARD ACCOUNTS
PURCHASE VEHICLES
APPLIES LOANS
IDENTITY THEFT
IT IS USUALLY REFERSTO SENDING AND RECEIVING RUDE MESSAGES OR VIDEOS OF:
NAKED PICTURES
UNDERWEAR SHOTS
ANY SEXUAL TEXTS, IMAGES OR VIDEOS
sexting