Cybercrime

Cards (47)

  • What does cybercrime refer to?
    Illegal activities using a computer over a network
  • What are some common types of cybercrime?
    • Identity and data theft
    • Internet fraud (online scams)
    • Hacking (unauthorised access)
    • Infecting devices with viruses
    • Denial of Service attacks
    • File sharing in breach of copyright
    • 3D Printing of illegal products
    • Cyberwarfare
    • Child pornography
  • What are the key characteristics of cybercrime?
    Use of digital technologies over networked devices
  • Why is disconnecting devices a strategy against cybercrime?
    It reduces the risk of unauthorized access
  • What does it mean that cybercrime is non-local in nature?
    It occurs in cyberspace, not physical locations
  • What is the significance of the 'data gap' in cybercrime?
    Most victims know nothing about their attackers
  • What is the distinction between cyber-dependent and cyber-enabled crime?
    • Cyber-dependent crime: Only possible over networks (e.g., hacking)
    • Cyber-enabled crime: Traditional crimes made easier online (e.g., identity theft)
  • What is an example of a cyber-dependent crime?
    Hacking
  • What is an example of a cyber-enabled crime?
    Identity theft
  • How has the internet changed traditional crimes?
    It has made them easier to commit
  • What are some contemporary examples of cybercrime?
    • Identity and data theft
    • Internet fraud (online scams)
    • Hacking
    • Data breaches
  • What percentage of the internet is visible?
    5%
  • What is the Deep Web?
    Part of the internet not indexed by search engines
  • What happens during a data breach?
    A company's private records are accessed illegally
  • What is the annual cost of data breaches to companies?
    Over $2 trillion annually
  • How can stolen personal data be misused?
    Used for phishing attempts or identity theft
  • What is a common type of phishing scam?
    'You've won a prize' emails
  • What are some types of internet fraud?
    • Covid-19 scams
    • Get rich quick investment scams
    • Instagram influencer scams
    • Phishing scams
    • False shopping scams
    • Nigerian Romance (419) scam
  • What is the 'Nigerian Romance' scam?
    A scam involving fake dating profiles
  • What is 'Scareware'?
    Fake alerts claiming your computer is infected
  • How do scammers exploit the 'Scareware' tactic?
    They gain access to victims' computers
  • What is the 'Microsoft Windows has been infected' scam?
    A scam claiming your Windows software is infected
  • What can happen if you fall for a 'Scareware' scam?
    Scammers may steal your personal data
  • What are the consequences of internet fraud?
    • Financial loss for victims
    • Emotional distress
    • Erosion of trust in online transactions
    • Increased security measures
  • What is the 'Microsoft Windows has been infected' scam also known as?
    Indian Call Centre scam
  • What do scammers do during the 'Indian Call Centre' scam?
    They gain access to your PC and steal data
  • What can scammers use stolen bank details for?
    To steal money or create fake accounts
  • How did the victim in the BBC article lose money to a scammer?
    By investing in a fake currency trading scheme
  • How much money did the victim lose to the Instagram scammer?
    £17,000
  • What is a notable statistic about Instagram accounts mentioned in the text?
    Almost half of accounts are fake
  • Who is Kevin Poulson?
    A famous hacker known for ARPANET hack
  • What was the outcome of Kevin Poulson's hacking as a minor?
    He was caught but not prosecuted
  • What did Kevin Poulson do at the age of 17?
    He hacked into ARPANET, The Pentagon's system
  • What is the significance of Kevin Poulson's story in understanding criminal behavior?
    It provides insight into the motivations of hackers
  • What is 'hactivism' commonly associated with?
    The group Anonymous
  • What was a notable action taken by Anonymous around 2010?
    They hacked Scientology's systems
  • How has hactivism reportedly changed during the Covid-19 pandemic?
    It has seen a resurgence
  • What can 3D printers be used to create illegally?
    Guns, access cards, and drugs
  • What is cyberwarfare?
    Attacks by nation states on systems
  • Which country has been accused of cyberwarfare recently?
    Russia