Cybercrime and Security in Computer Science

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/97

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

98 Terms

1
New cards

Cybercrime

Criminal activity on the Internet

2
New cards

Harassment

Cyberbullying - computer harassment between minors

3
New cards

Cyber-harassment

Computer harassment between adults

4
New cards

Cyber-stalking

More serious form of computer harassment that includes a credible threat of harm

5
New cards

Spam

Unsolicited email

6
New cards

First spam

Sent in the 1980's by an immigration lawyer

7
New cards

Spam estimates

At least half (50%) of all emails sent are spam

8
New cards

Spam filters

By default, sends suspected spam messages to a 'junk' folder

9
New cards

Finding spammers

Extremely difficult (normally use botnets to send)

10
New cards

ISPs and spam

Have to keep backups of ALL emails (including spam)

11
New cards

Phishing

Emails (and IMs) that appear to be from those you do business with, designed to trick you into revealing information

12
New cards

Spear Phishing

A phishing email (or IM) targeted to a specific individual

13
New cards

Smishing

Using fraudulent text messages to get you to take an action that is not in your best interest

14
New cards

Quishing

Legitimate QR codes are replaced by fraudulent QR codes, often in public places

15
New cards

Vishing

Voice Phishing

16
New cards

Pharming

Redirects you to a phony website even if you type in the correct address into your browser

17
New cards

DNS poisoning

Also known as DNS poisoning or DNS spoofing

18
New cards

Kidnapping / Grandparents Scams

A family member has been kidnapped and will be killed unless you pay a ransom

19
New cards

Message

May include personal information about you or the family member found by looking at social media channels.

20
New cards

Ransom Demand

Usually demands ransom be paid very quickly.

21
New cards

Grandparent Scam

A scam where an imposter poses as a grandchild claiming to be in an accident and needing money.

22
New cards

AI Voice Mimicking

AI being used to mimic voices so they seem very authentic.

23
New cards

Target Audience

Older people targeted as they are more susceptible.

24
New cards

Family Code Word

Suggestion to have a family code word or phrase to verify a family member's identity.

25
New cards

Clickjacking

Where clicking on a link allows malware to post unwanted links on your page.

26
New cards

Clickbait

A link that teases you with just enough information to get you to click, driving traffic to a web page.

27
New cards

Clickbait Examples

Examples such as 'You Won't Believe What This Celebrity Did!' or 'The Shocking Truth Behind a Popular Wellness Trend.'

28
New cards

Sharebait

Website content that exists only to be shared, aimed at generating advertising revenue, often relying on sensationalist headlines.

29
New cards

Computer Fraud

A scheme perpetrated over the Internet or email that tricks a victim into voluntarily giving money or property.

30
New cards

Advance-Fee Scam

Involves promising a large sum of money in return for a small up-front payment.

31
New cards

419 Scam

An email scam where the victim is told they need to create an account and deposit money before a large sum can be transferred.

32
New cards

Online Dating Scams

Scammers create fake profiles to get victims to fall in love and then ask for money.

33
New cards

Charity Fraud

Poses as a charitable organization soliciting donations for victims of natural disasters.

34
New cards

Shill Bidding

Fake bidding to drive up the price of an auction item.

35
New cards

Fake Charities

Organizations that falsely claim to be charitable to solicit donations.

36
New cards

Craigslist Scam

A scam where a buyer requests shipment before paying.

37
New cards

Medical Emergency Scam

A scam where the scammer asks for money to travel or for a medical emergency.

38
New cards

Fake Dating Sites

Some dating sites may be fake, asking users to create profiles to gather personal information.

39
New cards

Charity Impersonation

May impersonate actual charity like Red Cross.

40
New cards

Fake Website

May have a fake website.

41
New cards

Extortion

A person is subjected to repeated threats / attacks which will stop with paying of ransom.

42
New cards

Embarrassing Photos or Info

Embarrassing photos or info obtained and will be shared unless ransom paid (Jeff Bezos).

43
New cards

Ransomware

Data on system encrypted and will only be unlocked with paying of ransom.

44
New cards

Pump-and-Dump

Stock market manipulation scheme.

45
New cards

Stock Price Manipulation

Buy stock in a company, put false information out about the company to boost (pump) stock price, sell shares (dump) while price is high.

46
New cards

Salami Slicing

Stealing money repeatedly in extremely small quantities.

47
New cards

Penny Shaving

Amounts are small in hope that the thefts will go unnoticed.

48
New cards

Example of Salami Slicing

An employee transferring a single penny from every transaction handled by a bank.

49
New cards

Record Manipulation

Used to cover up evidence of theft.

50
New cards

Database Alteration

Database or other records altered so it appears nothing is missing.

51
New cards

Identity Theft

The deliberate use of someone else's identity.

52
New cards

Financial Identity Theft

Where someone fraudulently uses your name, Social Security number, or bank or credit card number.

53
New cards

Hacking

The act of gaining unauthorized access to a computer system or network.

54
New cards

Types of Hackers

Different types of hackers include Sneakers, Crackers, and Grey hat.

55
New cards

Hacktivism

Hacking to make a political statement.

56
New cards

Data Breach

A situation in which sensitive data is stolen or viewed by someone who is not authorized to do so.

57
New cards

2017 Equifax Data Breach

Resulted in over private records of over 140 million Americans being compromised.

58
New cards

Deep Web

The portion of the web that is not indexable by search engines.

59
New cards

Surface Web

Estimated that only about 5% of web can be found using a search engine.

60
New cards

Dark Web

A subset of the deep web that is encrypted and hidden and only accessible using the Tor browser.

61
New cards

Darknet Markets

Can be accessed anonymously to purchase illegal items such as guns, drugs, stolen data, etc.

62
New cards

Bitcoins

A type of cryptocurrency used for transactions.

63
New cards

Computer Criminals

Individuals who engage in illegal activities using computers, including employees, grey hat hackers, organized crime, and terrorist groups.

64
New cards

Malware

Malicious software designed to harm, exploit, or otherwise compromise a computer system.

65
New cards

Adware

Software that displays advertisements in the form of pop-ups and banners.

66
New cards

Spyware

Software installed without knowledge or consent that secretly gathers personal information.

67
New cards

Computer Virus

Self-replicating malware code that uses a host file to infect computers.

68
New cards

Computer Worm

Self-replicating malware program that does not need a host file and spreads through networks.

69
New cards

Trojan Horse

A program that appears legitimate but is actually malicious.

70
New cards

Logic Bomb

Malware that attacks when certain conditions are met.

71
New cards

Time Bomb

Malware that attacks on a certain day and time.

72
New cards

Rootkit

A set of programs that allows someone to gain control over a computer system while hiding the compromise.

73
New cards

Denial-of-Service (DOS) Attack

An attack that sends so much traffic that it can cripple a server or network.

74
New cards

Botnet

A network of computers controlled by a master, often used for launching DOS attacks or sending spam.

75
New cards

Antivirus Software

Security software that protects computers against viruses and other malicious software.

76
New cards

Antispyware Software

Security software used to prevent and remove adware and spyware.

77
New cards

Security Suite

A package of security software that includes a combination of firewall, antivirus, and antispyware programs.

78
New cards

Firewalls

A device or software that blocks unauthorized access to a network or individual computer.

79
New cards

Router

A device that connects two or more networks together.

80
New cards

IP Address

Information used to route data packets to the correct devices.

81
New cards

Firewall Software

Software that needs to be configured to protect home routers.

82
New cards

Public IP Address

The address of your router on the outside Internet.

83
New cards

Private IP Address

The address assigned to each computer/device within your local area network.

84
New cards

SSID

The name of a wireless network.

85
New cards

Wireless Encryption

Encrypts transmitted data, recommended to use WPA2-PSK.

86
New cards

Strong Passwords

Passwords that cannot be guessed or easily cracked, using a mixture of characters.

87
New cards

Password Length

Should use at least 8 characters; the longer the better.

88
New cards

Password Managers

Tools used to generate and store passwords securely.

89
New cards

Two-Factor Authentication

An account security measure requiring both a password and a verification code.

90
New cards

Encryption Software

Software used to encrypt files and messages to ensure they can only be accessed with a password.

91
New cards

HTTPS Protocol

Indicates that a web page is secure for entering personal or credit card info.

92
New cards

TLS

Transport Level Security, a protocol for securing communications over a computer network.

93
New cards

Software Updates

Releases by software publishers to address security holes in programs.

94
New cards

Auto Update

A recommended feature to automatically check for software updates.

95
New cards

WannaCry Ransomware Attack

An attack that exploited security holes in old versions of MS-Windows.

96
New cards

Zero-Day Exploit

An attack that occurs on or before the day an exploit is discovered.

97
New cards

Computer Fraud and Abuse Act (1986)

Makes it a crime to access classified information without authorization.

98
New cards

USA Patriot Act (2002)

Contains provisions for fighting cybercrime and allows government to scan emails.