Part 2 Flashcards

1
Q

The Budapest Convention on Cyber Crime provided the four general types of cybercrime:

A

• Offenses against the confidentiality, integrity and availability of computer data and systems,
• Computer-related offenses
• Content-related offenses
• Copyright-related offenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

when someone gains access to a website, program, server, service, or other system using someone else’s account.

A

Unauthorized Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any attempt to intrude into a computer or a network without authorization. This involves changing of system or security features in a bid to accomplish a goal that differs from the intended purpose of the system.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An individual who involves themselves in hacking activities is known as?

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It can be described as gaining unauthorized access to a computer system by improper means.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It can be describes as gaining access to a computer system using usual means of access but without consent.

A

Unauthorized Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the various kinds of hackers?

A

White hats
Black hat hackers
Gray hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

General classification of Cybercrime

A

Unauthorized access
Hacking
Cracking
Cyber fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

White hats is also known as?

A

Ethical hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Criminal by definition

A

Black hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

They belong to neutral zone

A

Gray hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

They strive to operate in the publics best interest, rather than to create turmoil.

A

White hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Many _________ work doing penetration, to attempt to break into the company’s networks to find and report on security vulnerabilities.

A

White hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

this kind of hackers, hack to take control over the system for personal gains. They destroy, steal and even prevent authorized users from accessing the system

A

Black hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

They act in the middle ground between white hat hackers, who operate on behalf of those maintaining secure systems, and sometimes act as black hat hackers who act maliciously to exploit vulnerabilities in systems.

A

Gray hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It means breaking into a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.

A

Cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

They also act as Black Hats by gaining access to the accounts of people maliciously and misusing this information across networks.

A

Crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It is the process of intruding computer systems without authorization in order to gain access to them, for good or bad purposes

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

It is breaking into the security system for criminal and illegal reasons or for personal gains only.

A

cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Common types of Cracking

A

Software cracking
Network cracking
Password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  • It is done to remove paid software requirements or pop-up purchase reminders so that people can access the software for free. “Cracked” software is a paid program that has had its copy protections removed.
A

Software cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It is the act of infiltrating a local area network (LAN). Sometimes referred to as web cracking or wired equivalent privacy (WEP) cracking, this usually involves accessing poorly secure networks.

A

Network cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

It is the act of stealing people’s passwords from databases.

A

Password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

the crime is committed via a computer and internet with the intent to corrupt another individual’s personal and financial information stored online from people illegally by deceiving them.

A

Cyber Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

It is a type of scam in which criminals attempt to obtain someone’s personal information by pretending to be a legitimate source.

A

Spoofing or Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Forms of Spoofing or Phishing

A

Email spoofing
Text message spoofing
URL spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

It is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.

A

Email spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In this spoofing the sender forges email headers so that client software displays the fraudulent sender address, which most users take at face value.

A

Email spoofing

30
Q

Sometimes referred to as smishing.

A

Text Message Spoofing

31
Q

This type of spoofing may appear to come from a legitimate source, such as your bank. It may request that you call a certain phone number or click on a link within the message, with the goal of getting you to divulge personal information.

A

Text message spoofing

32
Q

This happens when scammers set up a fraudulent website to obtain information from victims or to install malware on their computers.

A

URL Spoofing

33
Q

This are false reports about non-existent viruses, often claiming to do impossible things like blow up the recipient’s computer and set it on fire, or less sensationally, delete everything on the user’s computer.

A

Virus hoaxes

34
Q

The most common form of spoofing

A

URL Spoofing

35
Q

It is the unauthorized use of a credit or debit card, or similar payment tool to fraudulently obtain money or property. Credit and debit card numbers can be stolen from unsecured websites or can be obtained in an identity theft scheme.

A

Credit card fraud

36
Q

It is the scheme of obtaining the personal, financial information or other information of another person to use their identity to commit fraud or other illegal activities.

A

Identity theft

37
Q

Unauthorized use of Internet hours paid for by another person.

A

Theft of Internet Hours

38
Q

It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.

A

Cyber Terrorism

39
Q

It is the act of using cyberspace to create, display, distribute, import, or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults.

A

Cyber Pornography

40
Q

It is a term used when someone has posted or emailed something that is untrue and damaging about someone else on the social media, including blogs, chat rooms, personal websites, social media, social networking sites, or other published articles.

A

Cyber-libel or cyber defamation

41
Q

Cyber defamation is also called as?

A

Cyber smearing

42
Q

It refers to the use of the Internet, e-mail, or other electronic communications device to stalk and later on harass another person.

A

Cyber-stalking

43
Q

This is not punishable under RA 10175 but in RA 10627 the anti bullying act of 2013

A

Cyber stalking

44
Q

This is accomplish by flooding the target with traffic, or sending many information that triggers a crash on someone’s computer or computer network.

A

Denial of Service attacks- DoS

45
Q

This occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.

A

Distributed denial-of-service attack (DDoS attack) -

46
Q

It is a technique by which cyber-criminals steal money or resources a bit at a time so that it will be remain unnoticeable.

A

Salami Slicing Attack

47
Q

Salami Slicing Attack is also known as?

A

Salami fraud

48
Q

It is a common cyberattack where malware executes unauthorized actions on the victim’s computer system.

A

Malware attack

49
Q

This encompasses many specific types of attacks like infecting computers.

A

malicious software

50
Q

What are the common types of Malwares?

A

Adware
Ransomware
Rootkit
Trojan horse
Virus
Worm

51
Q

It is a type of malware that automatically delivers advertisements.

A

Adware – (Advertising-supported software)

52
Q

It is a malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.

A

Ransomware

53
Q

a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.

54
Q

Once this malware has been installed it is possible for the malicious party behind the ____ to remotely execute files, access/steal information.

55
Q

It can modify system configurations, alter software.

56
Q

It is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware.

A

Trojan Horse

57
Q

Trojan horse commonly known as a _____

58
Q

This can give a malicious party remote access to an infected computer. Once an attacker has access to an infected computer, it is possible for the attacker to steal data.

59
Q

This are designed to damage the target computer or device by corrupting data, reformatting your hard disk, or completely shutting down your system.

60
Q

It is a type of malware that spreads copies of itself from computer to computer.

61
Q

It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.

62
Q

Love bug virus to a considered as ______

63
Q

What are some preventive measures against cybercrimes?

A
  1. Keep software and operating system updated
  2. Use anti-virus software and keep it updated
  3. Use strong passwords
  4. Never open attachments in spam emails
  5. Hands typing on laptop keyboard
  6. Do not give out personal information unless secure
  7. Contact companies directly about suspicious requests
  8. Be mindful of which website URLs you visit
  9. Keep an eye on your bank statements
64
Q

Network of computer operated by single person

65
Q

URL stand for

A

Uniform Resource Locator

66
Q

HTTPS stands for

A

Hypertext Transfer Protocol Secure

67
Q

Instances to know if you are on a safe website

A

-There is a lock symbol
- https not http

68
Q

This was the first international treaty/agreement

A

Budapest convention of cybercrime 2001

69
Q

During this convention they crafted or created a guidelines to become basis in every country when developing laws in terms of penalizing/combating cyber crime offenses.

A

Budapest convention of cybercrime 2001

70
Q

It is a type of software or hardware that records every keystroke made on a computer or mobile device.