COMSEC Quiz 3: L3 (Midterms)

0.0(0)
studied byStudied by 4 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/40

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

41 Terms

1
New cards

2 types of cyber crime

(1) insider attack
(2) external attack

2
New cards

An attack to the network or the computer system by some person with authorized system access

insider attack

3
New cards

The motive of the insider attack could be (1)_____ or (2)_____

(1) revenge
(2) greed

4
New cards

The insider attack could be prevented by planning and installing an (1)_____ in the organization

(1) Internal intrusion detection systems (IDS)

5
New cards

The attacker is either hired by an insider or an external entity to the organization

(1) external attack

6
New cards

These attacks are generally performed by amateurs who don’t have any predefined motives to perform the cyber attack

UNSTRUCTURED ATTACKS

7
New cards

These types of attacks are performed by highly skilled and experienced people and the motives of these attacks are clear in their mind

STRUCTURED ATTACKS

8
New cards

STRUCTURED ATTACKS

They have access to sophisticated tools and technologies to gain access to other networks without being noticed by their (1)_____

(1) Intrusion Detection Systems (IDSs)

9
New cards

These types of attacks are usually performed by professional criminals, by a country on other rival countries, politicians to damage the image of their rival

STRUCTURED ATTACKS

10
New cards

6 prominent reasons for commission of cyber crimes

(1) money
(2) revenge
(3) fun
(4) recognition
(5) anonymity
(6) cyber espionage

11
New cards

revenge as a reason for commission of cyber crimes comes under the category of (1)_____

(1) cyber terrorism

12
New cards

IDENTIFY WHICH REASON FOR COMMISION OF CYBER CRIME

They just want to test the latest tool they have encountered

FUN

13
New cards

IDENTIFY WHICH REASON FOR COMMISION OF CYBER CRIME

It is considered to be pride if someone hack the highly secured networks like defense sites or networks

RECOGNITION

14
New cards

IDENTIFY WHICH REASON FOR COMMISION OF CYBER CRIME

At times the government itself is involved in cyber trespassing to keep eye on other person/network/country

The reason could be politically, economically socially motivated

CYBER ESPIONAGE

15
New cards

7 kinds of cyber crime

(1) cyber stalking
(2) child pornography
(3) forgery and counterfeiting
(4) software piracy and crime related to IPRS
(5) cyber terrorism
(6) phishing
(7) computer vandalism

16
New cards

IDENTIFY WHICH KIND OF CYBER CRIME

An act of stalking, harassing or threatening someone using Internet/computer as a medium

The behaviour includes false accusations, threats, sexual exploitation to minors, monitoring, etc

CYBER STALKING

17
New cards

IDENTIFY WHICH KIND OF CYBER CRIME

It is an act of possessing image or video of a minor (under 18), engaged in sexual conduct

CHILD PORNOGRAPHY

18
New cards

IDENTIFY WHICH KIND OF CYBER CRIME

It is a use of computer to forgery and counterfeiting of a document

FORGERY AND COUNTERFEITING

19
New cards

(1)_____ is an illegal reproduction and distribution for personal use or business

Software piracy

20
New cards

What does IPR stand for?

Intellectual Property Rights

21
New cards

IDENTIFY WHICH KIND OF CYBER CRIME

It is defined as the use of computer resources to intimidate or coerce government, the civilian population or any segment thereof in furtherance of political or social objectives

CYBER TERRORISM

22
New cards

IDENTIFY WHICH KIND OF CYBER CRIME

It is a process of acquiring personal and sensitive information of an individual via email by disguising as a trustworthy entity in an electronic communication

PHISHING

23
New cards

The purpose of phishing is (1)_____ and the personal information like username, password, and credit card number etc. may be used to steal money from user account

(1) identity theft

24
New cards

If a telephone is used as a medium for identity theft, it is known as (1)_____

(1) Vishing (voice phishing)

25
New cards

Another form of phishing is (1)_____, in which sms is used to lure customers

(1) Smishing

26
New cards

IDENTIFY WHICH KIND OF CYBER CRIME

It is an act of physically destroying computing resources using physical force or malicious code

COMPUTER VANDALISM

27
New cards

It is a practice of modifying computer hardware and software to accomplish a goal outside the creator’s original purpose

COMPUTER HACKING

28
New cards

3 classifications of hackers

(1) white hat
(2) black hat
(3) blue hat

29
New cards

the persons who hack the system to find the security vulnerabilities of a system and notify to the organizations so that a preventive action can be taken to protect the system from outside hackers

They are popular known as ethical hackers

white hat

30
New cards

They find the security loopholes the system, and keep the information themselves and exploit the system for personal or organizational benefits till organization whose system is compromised is aware of this, and apply security patches

They are popularly known as crackers

black hat

31
New cards

someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed

blue hat

32
New cards

Sending of unsolicited and commercial bulk message over the internet

spamming

33
New cards

An email can be classified as spam, if it meets following 3 criteria

(1) mass mailing
(2) anonymity
(3) unsolicited

34
New cards

Taking the advantage of the reputation of these websites, some of the cyber criminals lure the customers to (1)_____ schemes which often lead to either overpayment of the product or the item is never delivered once the payment is made

(1) online auction fraud

35
New cards

A form of cybercrime where the perpetrator buys or registers a domain name that is identical or similar to existing domain with the intention of profiting from a recognizable trademark, company name, or personal name

(1) Cybersquatting

36
New cards

The hacker gain access to a website of an organization and either blocks it or modify it to serve political, economical or social interest

WEB JACKING

37
New cards

Hacking the username and password of ISP of an individual and surfing the internet at his cost

Internet Time Thef

38
New cards

It is a cyber attack in which the network is choke and often collapsed by flooding it with useless traffic and thus preventing the legitimate network traffic

DENIAL OF SERVICE ATTACK

39
New cards

It is an attack which proceeds with small increments and final add up to lead to a major attack

Ex: gaining access to online banking of an individual and withdrawing amount in such a small amounts that it remains unnoticed by the owner

SALAMI ATTACK

40
New cards

It is a process of changing the header information of an e-mail so that its original source is not identified and it appears to an individual at the receiving end that the email has been originated from source other than the original source

EMAIL SPOOFING

41
New cards