Network Security Threats And Cybercrime Flashcards

1
Q

What is a Network?

A

A network is when two or more computers are connected, they make a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are a networks for?

A

Communication- sending messages and email

Devices- printers ect.

Storage devices- stores and share files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why do people commit Cybercrimes?

A

To make money

Cause trouble, attention/publicity, political reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are threats to a network’s security?

A

-Malware
-Spyware
-Hacking
-Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Malware?

A

Malware is software that harm your device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What words come from the word Malware?

A

‘Malicious’ and ‘software’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some types of malware?

A

Viruses- hides itself inside another file

Worm- copies itself to other computers across the network

Trojan- disguised as a good file

Rookit- Changes your OS so you cannot spot it

Backdoor- switches off security software to let malware through

Ransomeware- lock files. Criminals demand payment to unlock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the effects of Malware?

A

-Deletes files
-Alter computer settings
-Makes computer carry out unwanted actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does malware spread?

A

1) contained in files
2) hidden in software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is spyware?

A

Spyware is a virus that cannot be seen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who is spyware used by?

A

Criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Hacking?

A

Hacking is using someone else’s computer system without permission through a network’s connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does hackers break into computer system for?

A

-steal money
- credit card fraud
-steal sensitive information
-steal personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is piracy?

A

Software piracy is the illegal act of copying and distribution of software and media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can criminals make money from illegal copies of software?

A

Counterfeiting- copying and ssellinv software

Softlifting- buying one legal copy of software and installing on several machines

Hard-disking loading- selling computers with illegal software on it

Software rental- renting illegal software copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are other Cybercrimes?

A

-Phishing
-Internet Fraud
- identity theft

17
Q

What is Phishing?

A

Phishing is cybercriminals tricking you into giving away your personal information.

18
Q

How does phishing attempts happen?

A

-Emails
-Social media
-Text messages

19
Q

How to avoid phishing attempts?

A

-Be vigilant
-Think twice before clicking
-Check if every URL is legitmate

20
Q

What is internet fraud?

A

It is any type of fraud scheme that uses one or more components of the Internet.

21
Q

What are the major types of identity fraud?

A

-Online trading schemes
-Credit card fraud
-Business opportunity/ ‘work-at-home’ schemes

22
Q

What is Identity Theft?

A

It is schemes to obtain your personal information and use it to commit crimes

23
Q

How to protect yourself from identity theft?

A

-shred
-Secure passwords
-secure connections
-moniter
-detect

24
Q

What is cyberbullying/stalking/online cruelty?

A

It occurs when someone engages in offensive behavior towards another person using electronic means

25
What are online methods of cyber bullying/stalking/online cruelty?
Emails Tweets Blogs Messages
26
What are some ways of cyber bullying?
Posting Spamming Fake social profiles/websites Fake numbers Threats
27
What is trolling?
Someone who posts abusive or derograting online comments to social media to provoke reactions
28
How to deal with trolls?
Establish a policy for user comments Ignore Use humour Reveal trolls identity Fight back with facts
29
What are types of Illegal content?
Child pornography or child abuse Sexual violence Provokion into committing crimes Terrorism
30
What is digital citizenship
Digital citizenship means becoming to use technology in appropriate, responsible and intelligent way.
31
What is digital citizenship
Digital citizenship means becoming to use technology in appropriate, responsible and intelligent way.