Types of cybercrime
Viruses and Malware
Real life examples
Famous cybercrime cases
Laws and regulations
100

What is cybercrime?

Criminal activities using computers

100

What is a computer virus?

A virus is a harmful program that spreads to other files or computers

100

What is an example of a simple computer crime?

Stealing someone's social media password

100

Who is Kevin Mitnick and why is he famous in cyber crime history?

He was s famous hacker who broke into big systems

100

Can sending viruses to someone's computer be punished by law? Is it a crime?

Yes, it's a crime

200

What type of cybercrime do computer viruses belong to?

Malware

200

How does a virus spread from one computer to another?

Through infected files, e-mails or USB drives

200

What happened in the case of the Target data bridge in 2013?

Hackers stole 40 million credit card details

200

What crime did the "ILOVEYOU" virus creator commit?

He spread a harmful computer virus

200

What is the purpose of a digital privacy law?

To protect personal data online

300

What technological tools are used to detect cybercrimes in the Deep Web and Dark Web?

IP tracking, monitoring tools

300

Explain what a botnet is and how it operates

Botnet is a network of infected computers controlled by a hacker to perform attacks

300

How can social media be used for spreading harmful links or malware?

Hackers post fake links that install malware when clicked

300

What technique did the "Stuxnet" virus used to spread?

Through USB flash drives

300

What is the computer fraud and Abuse Act (CCFA) in the USA?

A law that stops hacking and computer fraud

400

What alternative security systems exist to prevent hacking and cyberattacks?

Blockchain, multi-factor authentication

400

What are the most advanced techniques by malware to avoid detection by antivirus software?

Techniques like polymorphism, encryption, and rootkits help malware hide

400

How can cyber criminals use cryptocurrency for money laundering?

They hide the source of illegally obtained money

400

What made the WannaCry ransomware attack global?

It locked computers worldwide and asked for money

400

What is the Budapest Convention on cybercrime?

A global agreement to fight cybercrime

500

What data and tools are needed to analyze cybercrimes?

Traffic data, forensic tools

500

What is a keylogger, and what kind of data can it steal?

Records keystrokes  to steal passwords and personal information

500

What is the role of fake antivirus software in real-life cyber crimes?

It tricks users into downloading malware

500

What methods did cybercriminals use in the Marriott hotel breach?

They accessed the system and stole guest data

500

How does copyright law apply to digital content online?

It protects music, videos, and software from being copied.

M
e
n
u