M Flashcards
this stands for malicious software. it is designed to gain access to a computer without the consent of the user
malware
they perform unwanted tasks in the host computer for the benefit of a third party
malware
special type of malware used for forced advertising. supported by the organizations whose products are advertised
adware
malicious software downloaded along with the free software on the internet and installed in the computer without the user’s knowledge.
browser hijacking software
this modifies the browsers setting and redirect links to other unintentional sites
browser hijacking software
installed in the target computer with or without the user permission and is designed to steal sensitive information from the target machine
spyware
this is a malicious code written to damage/harm the computer by deleting or appending a file, occupying memory space through code replication, slow down the performance of the computer, format the computer, etc…
virus
true or false: virus can be spread via email attachment, pen drives, digital images, e-greeting, audio, or video clips
true
true or false: a virus may be present in a computer but it cannot activate itself without human intervention or when the executable file (.exe) is executed
true
this virus can replicate itself and doesn’t need human intervention to travel over the network and spread from the infected machine to the whole network; can spread through the network, using the loopholes of the OS or via email
worms
the replication and spreading of the ____ over the network consume the network resources like space and bandwidth and force the network to choke
worm
this is a malicious code that is installed in the computer by pretending to be useful software. this not only damages the computer but also creates a backdoor in the computer so it can be controlled by a remote computer
trojan horse
this can become part of botnet (robot-network) or a network of computers infected by malicious code and controlled by a central controller
trojan horse
the computers infected by trojan horse are known as
zombies
true or false: trojans neither infect other computers in the network nor do they replicate
true
networks of hijacked computer devices used to carry out various scams and cyberattacks. these automate mass attacks, such as data theft, server crashing, and malware distribution
botnet
botnet is formed using two words
robot and network
while surfing the internet, suddenly a pop-up alert appears in the screen which warns the presence of dangerous virus, spyware, etc., and urges the user to download the full paid version of the software to fix the problem
scareware
as the user downloads the malicious code, their computer is held hostage until the ransom is paid. the malicious code can neither be uninstalled nor used until the ransom is paid
scareware
when was the internet born
1960’s; access is limited to scientists, researchers, and the defense only
when was the internet launched to the public
1996
this is used to describe an unlawful activity in which computer or computing devices, such as smartphones, tablets, personal digital assistants are used as a tool for criminal activity
cyber crime
this is often committed by the people of destructive and criminal mindset, either for revenge, greed or adventure
cyber crime
an attack to the network or computer by some person with authorized system access
insider attack
performed by dissatisfied or unhappy inside employees or contractors; motivation can be revenger or greed
insider attack
true or false: it is easy for an insider to perform a cyber attack as he is well aware of the policies, processes, IT architecture, and wellness of the security system
true
the insider attack could be prevented by planning and installing an _________ (IDS) in the organization
intrusion detection systems
the attacker is either hired by an insider or an external entity to the organization
external attack
cyber attacks can be classified as?
structure attacks and unstructured attacks base don the level of maturity of the attacker
generally performed by amateurs who don’t have any predefined motives to perform the cyber attack; they test a tool available on the internet on the network of a random company
unstructured attacks
performed by highly skilled and experienced people and the motives are clear in their mind; use tools that can’t be noticed by intrusion detection systems
structure attack
true or false: cyber crimes have turned out to be low investment, low-risk business with huge returns
true
people are motivated towards committing cyber crime to make quick and easy money
money
some people try to take revenge with other person/organizations/society/or religion by defaming its reputation or bringing economical or physical loss; comes under the category of cyber terrorism
revenge
one can have pride if they hack highly secured networks like defense sites or networks
recognition
the anonymity that a cyber space provides motivate cyber crimes; it is easier to get away with criminal activity in cyber space than the real word
anonymity
the government itself is involved in cyber trespassing to keep eye on other person/network/country; the reason could be politically, economically, or socially motivated
cyber espionage
this is an act of stalking, harassing or threatening someone using internet/computer as a medium; this is often done to defame a person using the internet as it offers anonymity; behavior includes false accusations, threats, sexual exploitation to minors, monitoring, etc…
cyber stalking
an act of possessing image or video of a minor (under 18) engaged in sexual conduct
child pornography
use of computer to forge or counterfeit a document
forgery and counterfeiting
true or false: because of the internet, it is possible to produce counterfeit that matches the original document to such an extent that it is not possible to judge the authenticity of the document without expert judgement
true