CYBER CRIME & SECURITY

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/62

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

63 Terms

1
New cards

Cybercrime

is nothing but where the computer is used as an object or subject of crime!

2
New cards

worm program

written by a college student shut down about 10 percent of computers connected to the Internet. This was the beginning of the era of cyber attacks.

3
New cards

1920

on what year does worm program begins?

4
New cards

1997

what year does virus

5
New cards

1995

Breaking Web Sites

6
New cards

2000

Malicious Code (Melissa) 

7
New cards

2003 - 2004

Advanced Worm/ Trojan (I Love You) 

8
New cards

2005 - 2006

Identity Theft (Phishing) 

9
New cards

2007 - 2008

Organised Crime Data Theft, DoS/DDoS

10
New cards

The Computer as a Target

The computer as a weapon

Categorization of Cyber crime 

11
New cards
  1. Hacking 

  2. Denial of service attack 

  3. Virus Dissemination 

  4. Computer Vandalism 

  5. Cyber Terrorism 

  6. Software Piracy

Types of Cyber crime 

12
New cards
  • Hacking 

  • Malware

  • Phishing 

  • Rootkits

  • Spam 

  • Spyware 

  • Trojans 

  • Viruses 

Examples of Cybercrime

13
New cards

Hacking

in simple terms means an illegal intrusion into a computer system and/or network .Also called as cracking

14
New cards

Cracking

Hacking also called

15
New cards

Hacking

means finding out weaknesses in an established system and exploiting them.

16
New cards

computer hacker

is a person who finds out weaknesses in the computer and exploits it.

17
New cards
  • For profit, protest, or challenge.

  • A large fraction of hacker attacks have been pranks

  • Financial Gain

  • Revenge

  • Venting anger at a company or organization

  • Terrorism

Why do hackers attack?  

18
New cards

Denial of Service Attack  

Attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the system so that no one else can use it.

19
New cards

Denial of Service Attack  

  • Act by the criminal, who floods the bandwidth of the victims network.

20
New cards

Virus Dissemination  

Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)

21
New cards

Computer Vandalism

Damaging or destroying data rather than stealing.

22
New cards

Computer Vandalism

Transmitting virus

23
New cards

Cyber Terrorism 

Use of Internet based attacks in terrorist activities.

24
New cards

Cyber Terrorism

Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.

25
New cards

Software Piracy

Theft of software through the illegal copying of genuine programs.

26
New cards

Software Piracy

Distribution of products intended to pass for the original.

27
New cards

Cyber security

is a branch of computer security specifically related to the Internet.

28
New cards

Cyber security

It's objective is to establish rules and measure to use against attacks over the Internet.

29
New cards
  1. Defend us from critical attacks.

  2. Browse the safe website.

  3. Internet security process all the incoming and outgoing data on our computer.

Advantages of Cyber Security 

30
New cards
  1. Install OS/SoftwareUpdates

  2. Run Anti-virus Software

  3. Prevent IdentityTheft

  4. Protect Passwords

  5. Avoid Spyware/Adware

  6. Turn on Personal Firewalls

  7. Back up ImportantFiles

Top Seven Cyber-Safety Actions 

31
New cards

Install OS/Software Updates

Updates-sometimes called patches-fix problems with your operating system (OS) (e.g., Windows XP, Windows Vista, Mac OS X) and software programs (e.g., Microsoft Office applications).

32
New cards

Install OS/Software Updates

Most new operating systems are set to download updates by default.

33
New cards

Install OS/Software Updates 

Be sure to restart your computer after updates are installed so that the patches can be applied immediately.

34
New cards

Run Anti-Virus Software

To avoid computer problems caused by viruses, install and run an anti-virus program like Norton,Quick Heal,etc.

35
New cards

Run Anti-Virus Software

Periodically, check to see if your anti-virus is up to date by opening your anti-virus program and checking the Last updated date.

36
New cards

Anti-virus software

removes viruses, quarantines and repairs infected files, and can help prevent future viruses.

37
New cards

Prevent Identity Theft

Don't give out financial account numbers, Social Security numbers, driver’s license numbers or other personal identity information unless you know exactly who's receiving it. Protect others people’s information as you would your own.


38
New cards

Prevent Identity Theft

Never send personal or confidential information via email or instant messages as these can be easily intercepted.

39
New cards

Beware of phishing scams

a form of fraud that uses email messages that appear to be from a reputable business (often a financial institution) in an attempt to gain personal or account information. Legitimate businesses will not ask for personal information online.

40
New cards

Protect Passwords 

Do not share your passwords, and always make new passwords difficult to guess by avoiding dictionary words, and mixing letters, numbers and punctuation.

41
New cards

Protect Passwords 

Do not use one of these common passwords or any variation of them: qwerty1, letmein,etc.

42
New cards

Protect Passwords 


Change your passwords periodically.

43
New cards
  • Mix upper and lower case letters

  • Use a minimum of 8 characters

  • Use mnemonics to help you remember a difficult password

  • When choosing a password:

44
New cards

Protect Passwords 

Store passwords in a safe place. Consider using KeePass Password Safe , an encrypted USB drive to store passwords.

45
New cards

Spyware and adware

take up memory and can slow down your computer or cause other problems.

46
New cards

Avoid Spyware/Adware 

Use Spybot and Ad-Aware to remove spyware/adware from your computer

47
New cards

Avoid Spyware/Adware 

Watch for allusions to spyware and adware in user agreements before installing free software programs.

48
New cards

Avoid Spyware/Adware 

Be wary of invitations to download software from unknown internet sources.

49
New cards

Firewalls

act as protective barriers between computers and the internet.

50
New cards

Turn on Personal Firewalls

Check your computer's security settings for a built-in personal firewall. If you have one, turn it on. Microsoft Vista and Mac OSX have built-in firewalls.

51
New cards

Turn on Personal Firewalls

Once your firewall is turned on, test your firewall for open ports that could allow in viruses and hackers. 

52
New cards

Turn on Personal Firewalls

Hackers search the Internet by sending out pings (calls) to random computers and wait for responses. Firewalls prevent your computer from responding to these calls.

53
New cards

Back up Important Files 

Reduce your risk of losing important files to a virus, computer crash, theft or disaster by creating back-up copies.

54
New cards

Back up Important Files 

Keep your critical files in one place on your computer’s hard drive so you can easily create a back up copy.

55
New cards

Back up Important Files 

Save copies of your important documents and files to a CD, online back up service, flash or USB drive, or a server.

56
New cards

Back up Important Files 

Store your back-up media in a secure place away from your computer, in case of fire or theft.

57
New cards

Cyber Safety at Home 

Physically secure your computer by using security cables and locking doors and windows in the dorms and off- campus housing.

58
New cards

Cyber Safety at Home 

Avoid leaving your laptop unsupervised and in plain view in the library or coffee house, or in your car, dorm room or home.

59
New cards

Cyber Safety at Home 

Set up a user account and password to prevent unauthorized access to your computer files.

60
New cards

Cyber Security at work 


Be sure to work with your technical support coordinator before implementing new cyber-safety measures.

61
New cards

Cyber Security at work 


Report to your supervisor any cyber-safety policy violations, security flaws/weaknesses you discover or any suspicious activity by unauthorized individuals in your work area.

62
New cards

Cyber Security at work 


Physically secure your computer by using security cables and locking building/office doors and windows.

63
New cards

Cyber Security at work 

Do not install unnecessary programs on your work computer.