Computer & Internet Crime (Group 3)

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

What is Computer and Internet Crime?

It is a crime involving computers, networks, or online systems, including unauthorized access, malware, phishing, data theft, and cyberterrorism.

2
New cards

Why is IT security important today?

Because increasing complexity, vulnerabilities, and evolving threats have led to more frequent and costly incidents.

3
New cards

What is a virus?

A piece of programming code, usually disguised as something else, that causes a computer to behave unexpectedly and undesirably.

4
New cards

What is a worm?

A standalone malware program that replicates itself to spread to other computers automatically.

5
New cards

What is a Trojan horse?

Malware disguised as a normal program to mislead users about its true intent.

6
New cards

What is a logic bomb?

A piece of code inserted into software that triggers a malicious function when certain conditions are met.

7
New cards

What is ransomware?

Malware that disables a device until the victim pays a ransom.

8
New cards

What is a rootkit?

Software that enables unauthorized access and hides its presence or other malware.

9
New cards

What is an exploit?

Code or a program that takes advantage of vulnerabilities to install malware or initiate attacks.

10
New cards

What is a zero-day vulnerability?

A security flaw unknown to the vendor and not yet patched.

11
New cards

What is a virus signature?

A unique string of code used by antivirus software to detect a specific virus.

12
New cards

What is phishing?

Fraudulent emails or websites that trick users into revealing personal data.

13
New cards

What is spear phishing?

A targeted phishing attack aimed at a specific individual, group, or organization.

14
New cards

What is smishing?

A cyberattack that uses SMS messages to trick victims.

15
New cards

What is vishing?

Voice phishing that uses phone calls to obtain sensitive information.

16
New cards

What is spam?

The abuse of email systems to send unsolicited messages.

17
New cards

What is a micro virus?

A virus written in macro languages that infects document templates.

18
New cards

What is the ILOVEYOU virus?

A worm disguised as a love letter created by Onel de Guzman that stole passwords and deleted files.

19
New cards

What is a DDoS attack?

An attack that floods a system with traffic from botnets to prevent legitimate use.

20
New cards

Who are hackers?

People who gain unauthorized access to systems, sometimes to test limits or expose weaknesses.

21
New cards

Who are crackers?

Individuals who break into systems with malicious intent.

22
New cards

Who are malicious insiders?

Employees or insiders who misuse internal access to commit fraud or theft.

23
New cards

Who are industrial spies?

Individuals who steal trade secrets for competitive advantage.

24
New cards

Who are cybercriminals?

Attackers motivated by monetary gain, often hacking to steal or sell data.

25
New cards

Who are hacktivists?

Activists who hack to promote political or social causes.

26
New cards

Who are cyberterrorists?

Attackers seeking maximum destruction, often targeting critical infrastructure.

27
New cards

What is the USA Patriot Act?

A law that defines cyberterrorism penalties (5–20 years imprisonment for severe damages).

28
New cards

What is the Identity Theft and Assumption Deterrence Act?

A law that criminalizes identity theft and imposes severe penalties.

29
New cards

What is the Fraud and Related Activity in Connection with Access Device Statute?

A law that criminalizes credit card fraud and the production or use of counterfeit access devices.

30
New cards

What does the CAN-SPAM Act regulate?

Unsolicited commercial emails, requiring truthful headers, opt-out options, and content labeling.

31
New cards

What is Trustworthy Computing (TWC)?

A computing approach focused on security, privacy, reliability, and business integrity.

32
New cards

What is a risk assessment?

The process of evaluating security risks from internal and external threats.

33
New cards

What is a security policy?

A written set of requirements and rules defining acceptable use and responsibilities.

34
New cards

What is a security audit?

A process that evaluates whether an organization’s security policies are adequate and followed.

35
New cards

What is a smart card?

A chip-based card used for secure authentication and resource access.

36
New cards

What is user education in security?

Training employees to recognize, avoid, and report security threats like phishing and smishing.

37
New cards

What are three key prevention measures?

Installing firewalls, using antivirus software, and conducting periodic security audits.

38
New cards

What does an Intrusion Detection System (IDS) do?

Monitors network traffic for suspicious activity and alerts on anomalies.

39
New cards

What are the main steps of incident response?

Notification, evidence protection, containment, eradication, and follow-up.

40
New cards

What is computer forensics?

The process of collecting and preserving digital evidence for legal use.

41
New cards

What is a botnet?

A network of compromised computers controlled remotely for malicious tasks.

42
New cards

What is a zombie computer?

A compromised computer controlled remotely without the owner's knowledge.

43
New cards

What is a data breach?

The exposure of confidential or sensitive information to unauthorized parties.

44
New cards

What is a VPN?

A secure, encrypted tunnel between a device and a remote server.

45
New cards

What is a CAPTCHA?

A test used to differentiate humans from bots.

Explore top flashcards