Cybercrime
Corporate Security
Social Networks
Malware
Potpourri
100
Research shows this as the primary reason for cybercrime.
Money $$$
100
Which is more secure, WPA or WEP?
WPA
100
Name two social network sites
Facebook, twitter, etc
100
Other than anti-virus, name one other piece of software that would protect your computer from malware.
firewall, others?
100
Define biometrics
using something you are as a password like your voice, fingerprints, retina scan, etc.
200
If I cyber criminal were to purchase your full identity on the black market, how much would it cost?
$25 each or as little as $1 per identity if purchased in bulk
200
describe a dictionary attack
a tool that uses all the words in the dictionary to guess passwords
200
Passwords should have at least these three types of characters.
letters, numbers, special characters #$%^&
200
It is contained in a valid program and usually offers the promise of something you might be interested in, such as a screen saver or photograph, but is deisgned to give hackers access to your computer or files.
What is a Trojan Horse?
200
The CIA triangle. What does CIA stand for?
confidentiality, integrity, availability
300
When a cyber criminal drives around looking for wireless networks to attack, this is called what?
wardriving
300
Describe a denial of service attack.
could be technical or non-technical. Cutting a cable or flooding a computer with data.
300
If you are concerned with privacy, how much personal information should you provide on social networks.
Very little to none
300
List two free anti-virus programs.
AVG, AVAST....others....?
300
In the video we watch about tracking down cyber criminals, what was the name of the cybercrime operation run by Sundin and Jain
IMU
400
Describe a honeypot?
A computer designed to lure and trap cyber criminals.
400
When you receive an email with a link in it, you are advised to open a separate browser and type (or retrieve from favorites) the URL you already know for the website instead of clicking on the link in the mail.
What is one way to verify a scam email link?
400
What technology allows cyber criminals to discover your whereabouts through your posts on social networks?
geolocation or location services
400
Defined as programs that track where you go on the Internet and what you type into your keyboard.
What is spyware?
400
What is the name of the greatest cyber weapon known to date?
stuxnet
500
What's the name of the very first computer virus and where did it originate (what country)?
Brain.A and Pakistan
500
Of the five threat categories, which is most dangerous and why?
internal intentional
500
What is China's version of twitter called?
weibo
500
Describe the difference between a virus and a worm.
Viruses typically travel on storage media or email and worms travel via networks
500
China actively censors the internet in a variety of ways calling this collective effort what?
The Great Firewall of China