cyber crime ans passkey mgt

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/128

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:33 AM on 4/8/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

129 Terms

1
New cards

What is Cyber Crime?

Criminal activity that involves unlawful access to computer systems and is committed on the internet.

2
New cards

What is an example of Cyber Crime?

Stealing credit card information or breaking into a government website.

3
New cards

When was the first recorded Cyber Crime?

In France during 1820, involving Joseph-Marie, a textile manufacturer.

4
New cards

What significant event in Cyber Crime occurred in 1978?

The first spam email was sent.

5
New cards

What was the first virus installed on a computer?

It was installed on an Apple Computer in 1982.

6
New cards

What are the two main categories of Cyber Crime?

  1. The Computer as a Target (e.g., hacking) 2. The Computer as a Weapon (e.g., cyber terrorism).
7
New cards

What is Hacking?

Unauthorized access to a computer system by a hacker.

8
New cards

What are the types of hackers?

  1. White Hat Hackers 2. Black Hat Hackers 3. Gray Hat Hackers.
9
New cards

What is Credit Card Fraud?

Using someone else's credit card without their knowledge for personal gain.

10
New cards

How can banks prevent Credit Card Fraud?

By implementing mobile security codes and two-step verification.

11
New cards

What is Virus Dissemination?

Malicious software that attaches itself to other software.

12
New cards

What should you be cautious about regarding email attachments?

Most current viruses arrive as email attachments, especially those with certain file extensions.

13
New cards

What is Cyber Terrorism?

Internet-based attacks used in terrorist activities.

14
New cards

What is Computer Vandalism?

Damaging or destroying data rather than stealing it.

15
New cards

What is Software Piracy?

Theft of software through illegal copying of genuine programs.

16
New cards

What does Spoofing mean in the IT context?

Tricking or deceiving computer systems or users, often by hiding one's identity.

17
New cards

What are two important Cyber Laws in Pakistan?

  1. Electronic Transaction Ordinance 2002 2. Electronic / Cyber Crime Bill 2007.
18
New cards

What is the purpose of the Electronic Transactions Ordinance (ETO) 2002?

To provide protection for Pakistani e-Commerce and critical infrastructure.

19
New cards

What does the Electronic/Cyber Crime Bill 2007 address?

Cyber terrorism, data damage, electronic fraud, unauthorized access to code, and cyber spamming.

20
New cards

What is the punishment for illegal access (hacking) under RA 10175?

Imprisonment for 6 years & 1 day to 12 years and a fine of at least ₱200,000.

21
New cards

What are some safety tips to prevent Cyber Crime?

Use antivirus software, maintain backups, and check security settings.

22
New cards

What is Cyber Security?

A branch of computer security related to the Internet, aimed at protecting against attacks.

23
New cards

What is one advantage of Cyber Security?

It defends against critical attacks and processes incoming and outgoing data.

24
New cards

What is the conclusion regarding Cyber Crime?

Awareness is key to protecting oneself, as not all cybercriminals are hackers.

25
New cards

What is a password?

A string of characters that gives you access to a computer or an online account.

26
New cards

What is social engineering in the context of password security?

Deceiving users into revealing their username and password, often by pretending to be a legitimate organization.

27
New cards

What is password cracking?

The process of breaking passwords to gain unauthorized access to a computer or account.

28
New cards

What is a brute force attack?

A method that uses every possible combination of characters to retrieve a password.

29
New cards

What is a dictionary attack?

An attack that uses every word in a dictionary of common words to identify the password.

30
New cards

What are the three categories in a tiered password system?

Low security, medium security, and high security.

31
New cards

What type of websites should use high security passwords?

Websites involving personal finance, such as banking and credit card accounts.

32
New cards

What is a common mistake when creating passwords?

Using a common password, such as '123456789' or 'password'.

33
New cards

Why is using personal data in passwords risky?

Anyone who knows you can easily guess this information.

34
New cards

What is the risk of using short passwords?

The shorter a password, the more opportunities for observing, guessing, and cracking it.

35
New cards

What is the danger of using the same password across multiple sites?

It's a single point of failure; if compromised, all accounts are at risk.

36
New cards

What makes a password strong?

A minimum of 8 characters, use of special characters, and a mix of upper and lower case letters.

37
New cards

What should strong passwords not contain?

Easily guessed information like birth dates, phone numbers, or dictionary words.

38
New cards

What is the recommended frequency for changing passwords?

Every six months.

39
New cards

What is Mozilla's safe password methodology?

Use a familiar phrase, abbreviate it, add special characters, and associate it with the website.

40
New cards

What should you do if you have used a weak password?

Change it immediately.

41
New cards

What is the purpose of a tiered password system?

To categorize passwords based on the security level needed for different types of websites.

42
New cards

What is a hands-on activity suggested for password management?

Categorize your passwords into high, medium, or low security.

43
New cards

Why is writing passwords down considered risky?

Anyone who finds the written note can access your account.

44
New cards

What should you do if you have used the same password for more than one site?

Change it to ensure security.

45
New cards

What is the consequence of a compromised high security password?

It could drastically and adversely affect your life.

46
New cards

What is the first step in creating a strong password?

Choose a familiar phrase or quote.

47
New cards

What is the recommended length for a strong password?

At least 12 characters.

48
New cards

What should you avoid including in your passwords?

Words found in the dictionary.

49
New cards

What is the risk of using common passwords?

They are often the first guesses by criminals.

50
New cards

What is a good practice for password security?

Treat your password like your toothbrush; don't share it and change it regularly.

51
New cards

What is a passphrase?

A phrase used to create a secure password by taking the first letter of each word.

52
New cards

How can you enhance the strength of a passphrase?

By adding symbols and numbers, such as !20Mtfbwy13!.

53
New cards

Why is it a bad idea to reuse passwords across multiple sites?

If one account is hacked, others using the same password are at risk.

54
New cards

What is the Password Haystack method?

A technique that pads a password with a memorable pattern to increase security.

55
New cards

What should you avoid when creating a password?

Using common phrases or easily guessable information.

56
New cards

What is a password manager?

Software that securely stores all your passwords, typically using one master password.

57
New cards

What are the strengths of human memory for storing passwords?

It is the safest database, but can be easy to forget.

58
New cards

What are the weaknesses of writing passwords down on paper?

It can be lost or stolen, and may be easily viewed by others.

59
New cards

What are the risks of storing passwords in a Word document?

Data is not encrypted, making it accessible to anyone with computer access.

60
New cards

What is a disadvantage of using a password manager?

If you forget the master password, all stored passwords are lost forever.

61
New cards

What is KeePass?

An open-source, cross-platform password manager that stores passwords in a single database.

62
New cards

What is a tiered password system?

A method to review and categorize existing passwords based on their security level.

63
New cards

What is the average number of passwords used by a web user?

The average web user maintains 25 separate accounts but uses just 6.5 passwords.

64
New cards

What should you do to ensure the security of a password management tool?

Review the quality of the service and ensure it is a reputable vendor.

65
New cards

What does the term 'password overload' refer to?

The difficulty of remembering multiple passwords, leading to the reuse of a few passwords.

66
New cards

What is the importance of password complexity?

Complex passwords are harder to guess or brute-force, enhancing security.

67
New cards

What is a common mistake people make regarding password security?

More than 60% of people use the same password across multiple sites.

68
New cards

What is the purpose of testing password strength?

To learn what works and what doesn't work without risking actual passwords.

69
New cards

What should you do after making a new entry in KeePass?

Always hit save to ensure the entry is stored.

70
New cards

What is a characteristic of strong passwords?

They are long, complex, and not based on easily guessable information.

71
New cards

What should you consider when creating a master password for a password manager?

It must be unique and complex to ensure the security of all stored passwords.

72
New cards

What is the significance of using a unique password for high-value accounts?

High-value accounts, like bank accounts, require stronger security to protect sensitive information.

73
New cards

What is the role of symbols in password creation?

Symbols increase the complexity and strength of a password.

74
New cards

What does 'padding' a password mean?

Adding a memorable pattern or scheme around the password to enhance security.

75
New cards

Why should you not rely solely on a password manager?

Because any system is vulnerable to attacks, creating a single point of failure.

76
New cards

What is the benefit of using a password manager?

It helps reduce the likelihood of passwords being compromised by securely storing them.

77
New cards

What should you do after making a new entry to the database?

Always hit save.

78
New cards

What is a recommended password manager mentioned?

Mozilla Firefox's Password Manager.

79
New cards

What is the risk of writing down passwords on post-it notes?

It can lead to unauthorized access to your accounts.

80
New cards

Why should you avoid using password-saving features on public PCs?

They may be infected with keyloggers or password-stealing trojan horses.

81
New cards

What is PwnedList?

A tool that helps users check if their account credentials have been hacked.

82
New cards

What is a characteristic of a strong password?

It should include a mix of uppercase and lowercase letters, numbers, and special characters.

83
New cards

What should you do if an opportunity seems too good to be true?

It probably is; be cautious.

84
New cards

What is one tip for preventing identity theft on public Wi-Fi?

Avoid using open Wi-Fi connections as they can be easily hacked.

85
New cards

What is the importance of HTTPS in online services?

It secures your connection and protects your data from being intercepted.

86
New cards

What should you do before providing your credit card number online?

Ensure the site is secure and reputable.

87
New cards

What is a common sign of auction fraud?

Inflated claims of product effectiveness or exaggerated earnings.

88
New cards

What should you check for on a cashier's check to avoid fraud?

Ensure the amount matches in figures and words and check for alterations.

89
New cards

What is phishing?

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.

90
New cards

What should you do if you receive unsolicited emails requesting credit card information?

Do not provide any information; it may be a scam.

91
New cards

What is the role of the Internet Crime Complaint Center (IC3)?

It helps inform the public about internet crime schemes and prevention measures.

92
New cards

What is shoulder surfing?

The act of observing someone's private information, such as passwords, without their knowledge.

93
New cards

What should you do if you suspect your password has been compromised?

Change it immediately and check for any unauthorized activity.

94
New cards

Why is it important to have different passwords for each site?

To minimize the risk of multiple accounts being compromised if one password is hacked.

95
New cards

What is a spoofed website?

A fraudulent website that mimics a legitimate one to deceive users.

96
New cards

What should you do if you are unsure about a seller on an auction site?

Contact the seller with questions and review their feedback.

97
New cards

What is the significance of using a secure browser?

It protects against malware, phishing attempts, and other security threats.

98
New cards

What are some common internet crime schemes?

Auction fraud, credit card fraud, identity theft, and phishing.

99
New cards

What is the best practice for creating passwords?

Use a mix of characters and avoid personal information.

100
New cards

What should you do if you encounter a suspicious email?

Do not click on links or provide personal information.