What is cybercrime?
Criminal activities using computers
What is a computer virus?
A virus is a harmful program that spreads to other files or computers
What is an example of a simple computer crime?
Stealing someone's social media password
Who is Kevin Mitnick and why is he famous in cyber crime history?
He was s famous hacker who broke into big systems
Can sending viruses to someone's computer be punished by law? Is it a crime?
Yes, it's a crime
What type of cybercrime do computer viruses belong to?
Malware
How does a virus spread from one computer to another?
Through infected files, e-mails or USB drives
What happened in the case of the Target data bridge in 2013?
Hackers stole 40 million credit card details
What crime did the "ILOVEYOU" virus creator commit?
He spread a harmful computer virus
What is the purpose of a digital privacy law?
To protect personal data online
What technological tools are used to detect cybercrimes in the Deep Web and Dark Web?
IP tracking, monitoring tools
Explain what a botnet is and how it operates
Botnet is a network of infected computers controlled by a hacker to perform attacks
How can social media be used for spreading harmful links or malware?
Hackers post fake links that install malware when clicked
What technique did the "Stuxnet" virus used to spread?
Through USB flash drives
What is the computer fraud and Abuse Act (CCFA) in the USA?
A law that stops hacking and computer fraud
What alternative security systems exist to prevent hacking and cyberattacks?
Blockchain, multi-factor authentication
What are the most advanced techniques by malware to avoid detection by antivirus software?
Techniques like polymorphism, encryption, and rootkits help malware hide
How can cyber criminals use cryptocurrency for money laundering?
They hide the source of illegally obtained money
What made the WannaCry ransomware attack global?
It locked computers worldwide and asked for money
What is the Budapest Convention on cybercrime?
A global agreement to fight cybercrime
What data and tools are needed to analyze cybercrimes?
Traffic data, forensic tools
What is a keylogger, and what kind of data can it steal?
Records keystrokes to steal passwords and personal information
What is the role of fake antivirus software in real-life cyber crimes?
It tricks users into downloading malware
What methods did cybercriminals use in the Marriott hotel breach?
They accessed the system and stole guest data
How does copyright law apply to digital content online?
It protects music, videos, and software from being copied.