Network Security Threats And Cybercrime Flashcards

1
Q

What is a Network?

A

A network is when two or more computers are connected, they make a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are a networks for?

A

Communication- sending messages and email

Devices- printers ect.

Storage devices- stores and share files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why do people commit Cybercrimes?

A

To make money

Cause trouble, attention/publicity, political reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are threats to a network’s security?

A

-Malware
-Spyware
-Hacking
-Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Malware?

A

Malware is software that harm your device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What words come from the word Malware?

A

‘Malicious’ and ‘software’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some types of malware?

A

Viruses- hides itself inside another file

Worm- copies itself to other computers across the network

Trojan- disguised as a good file

Rookit- Changes your OS so you cannot spot it

Backdoor- switches off security software to let malware through

Ransomeware- lock files. Criminals demand payment to unlock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the effects of Malware?

A

-Deletes files
-Alter computer settings
-Makes computer carry out unwanted actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does malware spread?

A

1) contained in files
2) hidden in software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is spyware?

A

Spyware is a virus that cannot be seen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who is spyware used by?

A

Criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Hacking?

A

Hacking is using someone else’s computer system without permission through a network’s connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does hackers break into computer system for?

A

-steal money
- credit card fraud
-steal sensitive information
-steal personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is piracy?

A

Software piracy is the illegal act of copying and distribution of software and media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can criminals make money from illegal copies of software?

A

Counterfeiting- copying and ssellinv software

Softlifting- buying one legal copy of software and installing on several machines

Hard-disking loading- selling computers with illegal software on it

Software rental- renting illegal software copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are other Cybercrimes?

A

-Phishing
-Internet Fraud
- identity theft

17
Q

What is Phishing?

A

Phishing is cybercriminals tricking you into giving away your personal information.

18
Q

How does phishing attempts happen?

A

-Emails
-Social media
-Text messages

19
Q

How to avoid phishing attempts?

A

-Be vigilant
-Think twice before clicking
-Check if every URL is legitmate

20
Q

What is internet fraud?

A

It is any type of fraud scheme that uses one or more components of the Internet.

21
Q

What are the major types of identity fraud?

A

-Online trading schemes
-Credit card fraud
-Business opportunity/ ‘work-at-home’ schemes

22
Q

What is Identity Theft?

A

It is schemes to obtain your personal information and use it to commit crimes

23
Q

How to protect yourself from identity theft?

A

-shred
-Secure passwords
-secure connections
-moniter
-detect

24
Q

What is cyberbullying/stalking/online cruelty?

A

It occurs when someone engages in offensive behavior towards another person using electronic means

25
Q

What are online methods of cyber bullying/stalking/online cruelty?

A

Emails
Tweets
Blogs
Messages

26
Q

What are some ways of cyber bullying?

A

Posting
Spamming
Fake social profiles/websites
Fake numbers
Threats

27
Q

What is trolling?

A

Someone who posts abusive or derograting online comments to social media to provoke reactions

28
Q

How to deal with trolls?

A

Establish a policy for user comments
Ignore
Use humour
Reveal trolls identity
Fight back with facts

29
Q

What are types of Illegal content?

A

Child pornography or child abuse
Sexual violence
Provokion into committing crimes
Terrorism

30
Q

What is digital citizenship

A

Digital citizenship means becoming to use technology in appropriate, responsible and intelligent way.

31
Q

What is digital citizenship

A

Digital citizenship means becoming to use technology in appropriate, responsible and intelligent way.