Deck 11: Cybercrime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
Play
Full screen (f)
Deck 11: Cybercrime
1
Which of the following best defines the term 'cyber-crime'?
A) Types of crime associated with the use of information technology systems and computers that are not connected to the Internet
B) Types of crime committed via the Internet, by someone/a group of people in another country other than the one in which the victim(s) experience the crime
C) Types of crime associated with the use of computers, the Internet, or information technology systems
D) Types of crime associated with new technologies
A) Types of crime associated with the use of information technology systems and computers that are not connected to the Internet
B) Types of crime committed via the Internet, by someone/a group of people in another country other than the one in which the victim(s) experience the crime
C) Types of crime associated with the use of computers, the Internet, or information technology systems
D) Types of crime associated with new technologies
C
2
What are 'Cyber Threat Actors'?
A) Those who are skilled at computer programming
B) Those who monitor cyber-threats
C) Those who perpetrate cyber-crime
D) Those who monitor threatening language on social media
A) Those who are skilled at computer programming
B) Those who monitor cyber-threats
C) Those who perpetrate cyber-crime
D) Those who monitor threatening language on social media
C
3
Which of the following would NOT be considered an example of cyber-crime?
A) Stealing a phone with the intent to immediately sell it on
B) Accessing a device without the owner's consent
C) Introducing malware onto a device
D) Illicit drug dealing in which the use of the internet is involved
A) Stealing a phone with the intent to immediately sell it on
B) Accessing a device without the owner's consent
C) Introducing malware onto a device
D) Illicit drug dealing in which the use of the internet is involved
A
4
In the context of cyber-crime, what are 'Advanced Persistent Threats' (APTs)?
A) Well-financed and resourced cyber threat actors who specialise in fraud
B) Well-financed and resourced cyber-criminal groups who continuously target companies or government agencies
C) Cyber threat actors who are career criminals
D) Well-financed and resourced cyber-criminal groups who create ransomware
A) Well-financed and resourced cyber threat actors who specialise in fraud
B) Well-financed and resourced cyber-criminal groups who continuously target companies or government agencies
C) Cyber threat actors who are career criminals
D) Well-financed and resourced cyber-criminal groups who create ransomware
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
What are the 4 key aspects critical to the handling of digital evidence?
A) Repeatability, auditability, confidentiality and integrity
B) Auditability, repeatability, reproducibility and justifiability
C) Reproducibility, justifiability, police cyber security measures and integrity
D) Justifiability, police cyber security measures, confidentiality and reproducibility
A) Repeatability, auditability, confidentiality and integrity
B) Auditability, repeatability, reproducibility and justifiability
C) Reproducibility, justifiability, police cyber security measures and integrity
D) Justifiability, police cyber security measures, confidentiality and reproducibility
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
The CIA triad is a useful model to assist in how one should think about an individuals' information security. What three things to consider make up the CIA triad?
A) Security, Confidentiality and Integrity
B) Confidentiality, Integrity and Availability
C) Confidentiality, Availability and Security
D) Integrity, Security and Availability
A) Security, Confidentiality and Integrity
B) Confidentiality, Integrity and Availability
C) Confidentiality, Availability and Security
D) Integrity, Security and Availability
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is NOT and the major issue surrounding the attribution of cyber-crime?
A) The use of VPNs or proxy servers
B) Cyber-crime may be transnational
C) A high confidence level is required when attempting to make attribution of cyber-crime
D) Public police agencies don't have the technology or ability to find IP addresses
A) The use of VPNs or proxy servers
B) Cyber-crime may be transnational
C) A high confidence level is required when attempting to make attribution of cyber-crime
D) Public police agencies don't have the technology or ability to find IP addresses
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
What is ransomware?
A) Software that makes a device unusable or data inaccessible until a 'ransom' has been paid
B) A type of virtual private network
C) Software used for sending out large scale amounts of phishing emails
D) An anti-virus software
A) Software that makes a device unusable or data inaccessible until a 'ransom' has been paid
B) A type of virtual private network
C) Software used for sending out large scale amounts of phishing emails
D) An anti-virus software
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
Why does cyber-crime often increase in times of confusion or global events?
A) Times of confusion or global events make people more likely to become CTAs
B) Cyber security is less effective during such times
C) CTAs are better able to exploit human vulnerabilities during such times
D) There is easier digital access during such times
A) Times of confusion or global events make people more likely to become CTAs
B) Cyber security is less effective during such times
C) CTAs are better able to exploit human vulnerabilities during such times
D) There is easier digital access during such times
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
What is the primary method by which cyber-crime exploits are begun?
A) By phone call
B) By E-mail
C) By hacking
D) By post
A) By phone call
B) By E-mail
C) By hacking
D) By post
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck