Traditional Computer Crime
Internet
Spam
Hacking
Malware
100

________ can be defined as the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.

Data Piracy

100

Random seemingly unrelated facts, numbers, words or statistics.

Data

100

Is it a good idea to "unsubscribe" or "reply to remove" my address from spam email? Why?

NO, Spammers validate email addresses and will send you more spam.

100

All of the information that someone can find out about you by searching the web is called your _____.

Digital footprint

100

Why is a router a form of security?

It acts like a firewall.

200

3 categories into which computer crimes are traditionally divided

1) computer as an instrument

2) computer as a target

3) computer as an incidental

200

William Gibson coined this portmanteau (blend of words) that refers to the Internet as a whole

Cyberspace

200

You receive an email from your bank telling you there is a problem with your account. The email provides instructions and a link so you can log in to your account and fix the problem. What should you do?

Delete the email. Better yet, use the web client (e.g. gmail, yahoo mail, etc.) and report it as spam or phishing, then delete it.

200

Someone used their yahoo account at a computer lab on campus. She made sure her yahoo account was no longer open in the browser window before leaving the lab. Someone came in behind her and used the same browser to re-access her account. They started sending emails from it and caused all sorts of mayhem. How?

Cookies made sure she was still logged in.

200

What is a network of infected computers?

Botnet

300

30-50% of all data loss due to the people already within the organization. Who are these people?

Insiders. Insider Threat.

300

What is a denial of service attack meant to do?

Make service inoperable.

300

What type of attack attempts to get a user to click on a malicious link or file by impersonating a trusted source the user is familiar with?

Phishing Attack

300

Two different offices on campus are working to straighten out an error in an employee's bank account due to a direct deposit mistake. Office #1 emails the correct account and deposit information to office #2, which promptly fixes the problem. The employee confirms with the bank that everything has, indeed, been straightened out. What's wrong here?

Account and deposit information is sensitive data that could be used for identity theft. Sending this or any kind of sensitive information by email is very risky because email is typically not private or secure. Anyone who knows how can access it anywhere along its route.

300

What type of malware functions by spying on user activity without their knowledge?

Spyware

400

A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems that is intended to disrupt and/or deny service or acquire information that disrupts the social, physical, or political infrastructure of a target

Cyberterrorism

400

What is a DDoS?

Distributed Denial of Service attack.

400

How did ChronoPay stay with MC & Visa for so long, when they processed transactions for many bad businesses?

They had a large customer-base of good businesses which "hid" the bad transactions.

400

What category of hackers use tools without the understanding of hacking.

Script kiddies

400

What is a self-contained program that may spread functional copies of itself to other computer systems

Worm

500

Disrupting, damaging, or destroying a Web site or computer network

Cyber vandalism

500

What is DNS?

Domain Name Server

500

What are "antis"?

Anti-spam companies.

500

The weakest link in every computer system. The one person who can through thoughtlessness, unawareness or accident, cause loss of work products through deletion, corruption or improperly safeguarding data.

The User
500

Claims that a virus is spreading and offer to provide software to stop the virus.

Virus Hoax

M
e
n
u