Part 3 Flashcards

1
Q

when someone gains access to a website, program, server, service, or other system using someone else’s account.

A

Unauthorized Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any attempt to intrude into a computer or a network without authorization. This involves changing of system or security features in a bid to accomplish a goal that differs from the intended purpose of the system.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the various kinds of hackers?

A
  • White hats
  • Black hats hackers
  • Gray hat hackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

also known as ethical hackers, strive to operate in the publics best interest, rather than to create turmoil.

A

White hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This kind of hackers work doing penetration, to attempt to break into the company’s networks to find and report on security vulnerabilities.

A

White hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

this kind of hackers, hack to take control over the system for personal gains.

A

Black hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This kind of hackers destroy, steal and even prevent authorized users from accessing the system.

A

Black hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

They belong to the neutral zone. They act in the middle ground between white hat hackers, who operate on behalf of those maintaining secure systems, and sometimes act as black hat hackers who act maliciously to exploit vulnerabilities in systems.

A

Gray hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is breaking into a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.

A

Cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

also act as Black Hats by gaining access to the accounts of people maliciously and misusing this information across networks.

A

Crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

They can steal credit card information, they can destroy important files, disclose crucial data and information or personal details and sell them for personal gains.

A

Crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is the process of intruding computer systems without authorization in order to gain access to them, for good or bad purposes

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is breaking into the security system for criminal and illegal reasons or for personal gains only.

A

Cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is the crime committed via a computer and internet with the intent to corrupt another individual’s personal and financial information stored online from people illegally by deceiving them.

A

Cyber Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is a type of scam in which criminals attempt to obtain someone’s personal information by pretending to be a legitimate source

A

Spoofing or Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.

A

Email Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Text message spoofing sometimes referred to as?

18
Q

It happens when scammers set up a fraudulent website to obtain information from victims or to install malware on their computers.

A

URL spoofing

19
Q

are false reports about non-existent viruses, often claiming to do impossible things like blow up the recipient’s computer and set it on fire, or less sensationally, delete everything on the user’s computer

A

Virus hoax emails

20
Q

These are emails, which inform the recipient that he/ she has won a prize in a lottery.

A

Lottery Frauds

21
Q

is the unauthorized use of a credit or debit card, or similar payment tool to fraudulently obtain money or property.

A

Credit card Frauds

22
Q

is the scheme of obtaining the personal, financial information or other information of another person to use their identity to commit fraud or other illegal activities.

A

Identity Theft

23
Q

Unauthorized use of Internet hours paid for by another person.

A

Theft of internet hours

24
Q

It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.

A

Cyber Terrorism

25
Q

is the act of using cyberspace to create, display, distribute, import, or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults.

A

Cyber Pornography

26
Q

is a term used when someone has posted or emailed something that is untrue and damaging about someone else on the social media, including blogs, chat rooms, personal websites, social media, social networking sites, or other published articles

A

Cyber-Libel or Cyber Defamation

27
Q

Cyber Defamation is also called?

A

Cyber Smearing

28
Q

refers to the use of the Internet, e-mail, or other electronic communications device to stalk and later on harass another person.

A

Cyber Stalking

29
Q

accomplish this by flooding the target with traffic, or sending many information that triggers a crash on someone’s computer or computer network

A

Denial of Service Attacks

30
Q

occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers

A

Distributed Denial of Service Attack (DDoS attack)

31
Q

is a technique by which cyber-criminals steal money or resources a bit at a time so that it will be remain unnoticeable.

A

Salami Slicing Attack

32
Q

is a common cyberattack where malware executes unauthorized actions on the victim’s computer system. The malicious software encompasses many specific types of attacks like infecting computers.

A

Malware Attack

33
Q

What are the common types of Malware?

A
  • Adware
  • Ransomware
  • Rootkit
  • Trojan horse
  • Virus
  • Worm
34
Q

is a type of malware that automatically delivers advertisements

35
Q

is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.

A

Ransomware

36
Q

is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs

37
Q

is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware.

A

Trojan Horse

38
Q

can give a malicious party remote access to an infected computer

A

Trojan Horse

39
Q

are designed to damage the target computer or device by corrupting data, reformatting your hard disk, or completely shutting down your system

40
Q

is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.