Cybercrime
ComSec
I.S.
Components
Cryptography
100

An act of creating a false document.

Forgery

100

It allows one to access your information without repercussions.

Consent

100

It is also considered as Asset.

Information

100

This is the physical part of the computer

Hardware

100

It means secret.

Crypt

200

It is a process of acquiring personal and sensitive information of an individual via email by disguising as a trustworthy entity in an electronic communication.

Phishing

200

It protects all forms of digital information, including computers, handheld devices, cloud, and networks

Cybersecurity

200

It refers to the ability to prevent our data from being changed in an unauthorized or undesirable manner.

Integrity
200

This is a permanent software etched into the hardware to make it work.

Firmware

200

A mechanism to prove that the sender really sent this message.

Non-repudiation

300

It is an attack which proceeds with small increments and final add up to lead to a major attack.

Salami Attack

300

T or F: Having your birthday as password is safe.

False

300

It is also what we call unauthorized use.

Piracy

300

The ultimate goal of this is to make sure the computer won't operate properly

Computer virus

300

The method by which crypto keys are shared between sender and receiver.

Key exchange

400

The perpetrator buys a domain in bad faith.

Cyber Squatting

400

T or F: Compromise of computer security does not cost you anything.

False

400

This is done when the likelihood of threats/vulnerabilities is high, but their effect is low.

Risk Reduction

400

This is a program software that can copy itself without human interaction.

Computer worm

400

It uses mathematical transformation to irreversibly "encrypt" information providing a digital fingerprint.

Hash Functions

500

The network is choke and often collapsed by flooding it with useless traffic and thus preventing the legitimate network traffic

Denial of Service Attack

500

This might happen when you let your personal information easily available to anyone.

Identity Theft

500

If the threats and vulnerabilities are highly likely to occur and the impact is also extremely high

Risk avoidance

500

A tactic used to reveal your personal information.

Social engineering

500

ylkrp

BONUS