Cybercrime: Security and Privacy in the Digital Age

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/81

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

82 Terms

1
New cards

Cybercrime

Criminal activity on the Internet

2
New cards

Cyber-bullying

Computer harassment between minors

3
New cards

Cyber-harassment

Computer harassment between adults using email, text messages, IMs, and social networks to embarrass, threaten, or torment someone

4
New cards

Cyber-stalking

More serious form of computer harassment that includes a credible threat of harm

5
New cards

Spam

Unsolicited email

6
New cards

First spam

Sent in the 1980's by an immigration lawyer

7
New cards

Spam estimates

At least half (50%) of all emails sent are spam

8
New cards

Spam filters

By default, sends suspected spam messages to a 'junk' folder

9
New cards

Finding spammers

Extremely difficult as they normally use botnets to send

10
New cards

ISPs backup

Have to keep backups of ALL emails (including spam)

11
New cards

Phishing

Emails (and IMs) that appear to be from those you do business with, designed to trick you into revealing information

12
New cards

Spear Phishing

A phishing email (or IM) targeted to a specific individual

13
New cards

Pharming

Redirects you to a phony website even if you type in the correct address into your browser

14
New cards

Vishing

Voice Phishing where victims are called, may hear a recording or a live person

15
New cards

Kidnapping Scams

A family member has been kidnapped and will be killed unless you pay a ransom

16
New cards

Grandparent Scams

Grandparent called by an imposter posing as grandchild saying he/she has been in an accident and needs money

17
New cards

AI in scams

AI being used to mimic voices so they seem very authentic

18
New cards

Social Network Attacks

Clickjacking - where clicking on a link allows malware to post unwanted links on your page

19
New cards

Clickbait

A link that teases you with just enough information to get you to click the link

20
New cards

Sharebaiting

When users share posts, often without actually clicking them first, which can lead you to believe the links are safe

21
New cards

Computer Fraud

A scheme perpetrated over the Internet or email that tricks a victim into voluntarily and knowingly giving money or property

22
New cards

Advance-fee scams

Involves promising a large sum of money in return for a small up-front payment

23
New cards

419 scam

Email sent saying help needed to transfer a large sum of money, but requires creating an account and depositing money before the transfer

24
New cards

Online Dating Scams

Scammer may create fake social media profiles to get a person to fall in love and ask for money

25
New cards

Charity Fraud

Poses as a Charitable Organization soliciting donations for victims of natural disasters, etc.

26
New cards

Charity Impersonation

May impersonate actual charity like Red Cross

27
New cards

Fake Website

May have a fake website

28
New cards

Extortion

A person is subjected to repeated threats / attacks which will stop with paying of ransom

29
New cards

Ransom

Embarrassing photos or info obtained and will be shared unless ransom paid (Jeff Bezos)

30
New cards

Ransomware

Data on system encrypted and will only be unlocked with paying of ransom

31
New cards

Pump-and-Dump

Stock market manipulation scheme

32
New cards

Stock Purchase

Buy stock in a company

33
New cards

False Information

Put false information out about the company to boost (pump) stock price

34
New cards

Share Selling

Sell shares (dump) while price is high

35
New cards

Stock Price Drop

When people find out the information was false, stock price usually drops

36
New cards

Record Manipulation

Used to cover up evidence of theft

37
New cards

Database Alteration

Database or other records altered so it appears nothing is missing

38
New cards

Embezzlement Cover-up

Could also be used to cover up embezzlement

39
New cards

Insider Access

Usually done by employee or other insider with access to company's system

40
New cards

Employee Monitoring

To help prevent this, not uncommon for companies to monitor their employees' computer activities

41
New cards

Salami Slicing

Stealing money repeatedly in extremely small quantities

42
New cards

Small Amounts Theft

Amounts are small in hope that the thefts will go unnoticed

43
New cards

Penny Transfer Example

Example: An employee transferring a single penny from every transaction handled by a bank

44
New cards

Identity Theft

The deliberate use of someone else's identity

45
New cards

Financial Identity Theft

most common: where someone fraudulently uses your name, Social Security number, or bank or credit card number

46
New cards

Hacking

The act of gaining unauthorized access to a computer system or network

47
New cards

Data Breach

A situation in which sensitive data is stolen or viewed by someone who is not authorized to do so

48
New cards

Deep Web

The portion of the web that is not indexable by search engines

49
New cards

Dark Web

A subset of the deep web that is encrypted and hidden and only accessible using the Tor browser to view it anonymously and securely

50
New cards

Malware

Malicious Software that includes spam, adware, and spyware

51
New cards

Computer Virus

Self-replicating malware code that uses a host file (program) to infect computers

52
New cards

Computer Worm

Self-replicating malware program that does not need a host file

53
New cards

Trojan Horse

A program that appears to be legitimate but is actually malicious

54
New cards

Logic Bomb

Malware that attacks when certain conditions are met

55
New cards

Time Bomb

Malware that attacks on a certain day and time

56
New cards

Rootkit

A set of programs that allows someone to gain control over a computer system while hiding the fact the computer has been compromised

57
New cards

Denial-of-Service Attack

An attack that sends so much traffic that it can cripple a server or network

58
New cards

Firewall

A device or software that blocks unauthorized access to a network or individual computer

59
New cards

Antivirus Software

Security software that protects computers against viruses and other malicious software

60
New cards

Router

A device that connects two or more networks together.

61
New cards

Bitcoins

A type of cryptocurrency used for transactions.

62
New cards

Computer Criminals

Individuals or groups that engage in illegal activities using computers.

63
New cards

Employees / insiders

Individuals within a company who may commit cybercrimes, often monitored by the company.

64
New cards

Grey hat hackers / crackers

Individuals who may violate laws or ethical standards but without malicious intent.

65
New cards

Organized crime

Criminal organizations that engage in illegal activities, including cybercrime.

66
New cards

Terrorist groups

Organizations that use cyber methods to achieve their goals.

67
New cards

Adware

Software that shows ads in the form of pop-ups and banners.

68
New cards

Spyware

Software installed without knowledge or consent that secretly gathers personal information.

69
New cards

Denial-of-Service (DOS) Attack

An attack that sends excessive traffic to cripple a server or network.

70
New cards

Botnet

A network of computers controlled by a master, used for launching DOS attacks or sending spam.

71
New cards

Firewalls

Devices or software that block unauthorized access to a network or computer.

72
New cards

Antispyware Software

Security software used to prevent and remove adware and spyware.

73
New cards

Security Suite

A package of security software that includes firewall, antivirus, and antispyware programs.

74
New cards

SSID

The name of a wireless network.

75
New cards

Wireless Encryption

Encrypts transmitted data, with WPA2-PSK being a recommended method.

76
New cards

Passwords

Typical method for securing access to accounts, requiring strong, unique combinations.

77
New cards

Two-Factor Authentication

An account security measure requiring both a password and a verification code.

78
New cards

Encryption

Software used to encrypt files and messages to ensure only authorized access.

79
New cards

Updating Software

The process of applying updates to software to address security vulnerabilities.

80
New cards

Zero-Day Exploit

An attack that occurs on or before the day an exploit is discovered.

81
New cards

Computer Fraud and Abuse Act (1986)

A law making it a crime to access classified information without authorization.

82
New cards

USA Patriot Act (2002)

Legislation containing provisions for fighting cybercrime and allowing government email scans.