1/128
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is Cyber Crime?
Criminal activity that involves unlawful access to computer systems and is committed on the internet.
What is an example of Cyber Crime?
Stealing credit card information or breaking into a government website.
When was the first recorded Cyber Crime?
In France during 1820, involving Joseph-Marie, a textile manufacturer.
What significant event in Cyber Crime occurred in 1978?
The first spam email was sent.
What was the first virus installed on a computer?
It was installed on an Apple Computer in 1982.
What are the two main categories of Cyber Crime?
What is Hacking?
Unauthorized access to a computer system by a hacker.
What are the types of hackers?
What is Credit Card Fraud?
Using someone else's credit card without their knowledge for personal gain.
How can banks prevent Credit Card Fraud?
By implementing mobile security codes and two-step verification.
What is Virus Dissemination?
Malicious software that attaches itself to other software.
What should you be cautious about regarding email attachments?
Most current viruses arrive as email attachments, especially those with certain file extensions.
What is Cyber Terrorism?
Internet-based attacks used in terrorist activities.
What is Computer Vandalism?
Damaging or destroying data rather than stealing it.
What is Software Piracy?
Theft of software through illegal copying of genuine programs.
What does Spoofing mean in the IT context?
Tricking or deceiving computer systems or users, often by hiding one's identity.
What are two important Cyber Laws in Pakistan?
What is the purpose of the Electronic Transactions Ordinance (ETO) 2002?
To provide protection for Pakistani e-Commerce and critical infrastructure.
What does the Electronic/Cyber Crime Bill 2007 address?
Cyber terrorism, data damage, electronic fraud, unauthorized access to code, and cyber spamming.
What is the punishment for illegal access (hacking) under RA 10175?
Imprisonment for 6 years & 1 day to 12 years and a fine of at least ₱200,000.
What are some safety tips to prevent Cyber Crime?
Use antivirus software, maintain backups, and check security settings.
What is Cyber Security?
A branch of computer security related to the Internet, aimed at protecting against attacks.
What is one advantage of Cyber Security?
It defends against critical attacks and processes incoming and outgoing data.
What is the conclusion regarding Cyber Crime?
Awareness is key to protecting oneself, as not all cybercriminals are hackers.
What is a password?
A string of characters that gives you access to a computer or an online account.
What is social engineering in the context of password security?
Deceiving users into revealing their username and password, often by pretending to be a legitimate organization.
What is password cracking?
The process of breaking passwords to gain unauthorized access to a computer or account.
What is a brute force attack?
A method that uses every possible combination of characters to retrieve a password.
What is a dictionary attack?
An attack that uses every word in a dictionary of common words to identify the password.
What are the three categories in a tiered password system?
Low security, medium security, and high security.
What type of websites should use high security passwords?
Websites involving personal finance, such as banking and credit card accounts.
What is a common mistake when creating passwords?
Using a common password, such as '123456789' or 'password'.
Why is using personal data in passwords risky?
Anyone who knows you can easily guess this information.
What is the risk of using short passwords?
The shorter a password, the more opportunities for observing, guessing, and cracking it.
What is the danger of using the same password across multiple sites?
It's a single point of failure; if compromised, all accounts are at risk.
What makes a password strong?
A minimum of 8 characters, use of special characters, and a mix of upper and lower case letters.
What should strong passwords not contain?
Easily guessed information like birth dates, phone numbers, or dictionary words.
What is the recommended frequency for changing passwords?
Every six months.
What is Mozilla's safe password methodology?
Use a familiar phrase, abbreviate it, add special characters, and associate it with the website.
What should you do if you have used a weak password?
Change it immediately.
What is the purpose of a tiered password system?
To categorize passwords based on the security level needed for different types of websites.
What is a hands-on activity suggested for password management?
Categorize your passwords into high, medium, or low security.
Why is writing passwords down considered risky?
Anyone who finds the written note can access your account.
What should you do if you have used the same password for more than one site?
Change it to ensure security.
What is the consequence of a compromised high security password?
It could drastically and adversely affect your life.
What is the first step in creating a strong password?
Choose a familiar phrase or quote.
What is the recommended length for a strong password?
At least 12 characters.
What should you avoid including in your passwords?
Words found in the dictionary.
What is the risk of using common passwords?
They are often the first guesses by criminals.
What is a good practice for password security?
Treat your password like your toothbrush; don't share it and change it regularly.
What is a passphrase?
A phrase used to create a secure password by taking the first letter of each word.
How can you enhance the strength of a passphrase?
By adding symbols and numbers, such as !20Mtfbwy13!.
Why is it a bad idea to reuse passwords across multiple sites?
If one account is hacked, others using the same password are at risk.
What is the Password Haystack method?
A technique that pads a password with a memorable pattern to increase security.
What should you avoid when creating a password?
Using common phrases or easily guessable information.
What is a password manager?
Software that securely stores all your passwords, typically using one master password.
What are the strengths of human memory for storing passwords?
It is the safest database, but can be easy to forget.
What are the weaknesses of writing passwords down on paper?
It can be lost or stolen, and may be easily viewed by others.
What are the risks of storing passwords in a Word document?
Data is not encrypted, making it accessible to anyone with computer access.
What is a disadvantage of using a password manager?
If you forget the master password, all stored passwords are lost forever.
What is KeePass?
An open-source, cross-platform password manager that stores passwords in a single database.
What is a tiered password system?
A method to review and categorize existing passwords based on their security level.
What is the average number of passwords used by a web user?
The average web user maintains 25 separate accounts but uses just 6.5 passwords.
What should you do to ensure the security of a password management tool?
Review the quality of the service and ensure it is a reputable vendor.
What does the term 'password overload' refer to?
The difficulty of remembering multiple passwords, leading to the reuse of a few passwords.
What is the importance of password complexity?
Complex passwords are harder to guess or brute-force, enhancing security.
What is a common mistake people make regarding password security?
More than 60% of people use the same password across multiple sites.
What is the purpose of testing password strength?
To learn what works and what doesn't work without risking actual passwords.
What should you do after making a new entry in KeePass?
Always hit save to ensure the entry is stored.
What is a characteristic of strong passwords?
They are long, complex, and not based on easily guessable information.
What should you consider when creating a master password for a password manager?
It must be unique and complex to ensure the security of all stored passwords.
What is the significance of using a unique password for high-value accounts?
High-value accounts, like bank accounts, require stronger security to protect sensitive information.
What is the role of symbols in password creation?
Symbols increase the complexity and strength of a password.
What does 'padding' a password mean?
Adding a memorable pattern or scheme around the password to enhance security.
Why should you not rely solely on a password manager?
Because any system is vulnerable to attacks, creating a single point of failure.
What is the benefit of using a password manager?
It helps reduce the likelihood of passwords being compromised by securely storing them.
What should you do after making a new entry to the database?
Always hit save.
What is a recommended password manager mentioned?
Mozilla Firefox's Password Manager.
What is the risk of writing down passwords on post-it notes?
It can lead to unauthorized access to your accounts.
Why should you avoid using password-saving features on public PCs?
They may be infected with keyloggers or password-stealing trojan horses.
What is PwnedList?
A tool that helps users check if their account credentials have been hacked.
What is a characteristic of a strong password?
It should include a mix of uppercase and lowercase letters, numbers, and special characters.
What should you do if an opportunity seems too good to be true?
It probably is; be cautious.
What is one tip for preventing identity theft on public Wi-Fi?
Avoid using open Wi-Fi connections as they can be easily hacked.
What is the importance of HTTPS in online services?
It secures your connection and protects your data from being intercepted.
What should you do before providing your credit card number online?
Ensure the site is secure and reputable.
What is a common sign of auction fraud?
Inflated claims of product effectiveness or exaggerated earnings.
What should you check for on a cashier's check to avoid fraud?
Ensure the amount matches in figures and words and check for alterations.
What is phishing?
A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
What should you do if you receive unsolicited emails requesting credit card information?
Do not provide any information; it may be a scam.
What is the role of the Internet Crime Complaint Center (IC3)?
It helps inform the public about internet crime schemes and prevention measures.
What is shoulder surfing?
The act of observing someone's private information, such as passwords, without their knowledge.
What should you do if you suspect your password has been compromised?
Change it immediately and check for any unauthorized activity.
Why is it important to have different passwords for each site?
To minimize the risk of multiple accounts being compromised if one password is hacked.
What is a spoofed website?
A fraudulent website that mimics a legitimate one to deceive users.
What should you do if you are unsure about a seller on an auction site?
Contact the seller with questions and review their feedback.
What is the significance of using a secure browser?
It protects against malware, phishing attempts, and other security threats.
What are some common internet crime schemes?
Auction fraud, credit card fraud, identity theft, and phishing.
What is the best practice for creating passwords?
Use a mix of characters and avoid personal information.
What should you do if you encounter a suspicious email?
Do not click on links or provide personal information.