Save
Crime and deviance
Cybercrime
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
a
Visit profile
Cards (47)
What does cybercrime refer to?
Illegal activities using a
computer
over a
network
View source
What are some common types of cybercrime?
Identity and data theft
Internet fraud
(online scams)
Hacking
(unauthorised access)
Infecting devices with
viruses
Denial of Service
attacks
File sharing in breach of
copyright
3D Printing
of illegal products
Cyberwarfare
Child pornography
View source
What are the key characteristics of cybercrime?
Use of
digital technologies
over
networked devices
View source
Why is disconnecting devices a strategy against cybercrime?
It reduces the risk of
unauthorized access
View source
What does it mean that cybercrime is non-local in nature?
It occurs in
cyberspace
, not physical locations
View source
What is the significance of the 'data gap' in cybercrime?
Most victims know nothing about their
attackers
View source
What is the distinction between cyber-dependent and cyber-enabled crime?
Cyber-dependent crime: Only possible over networks (e.g.,
hacking
)
Cyber-enabled crime: Traditional crimes made easier online (e.g., identity theft)
View source
What is an example of a cyber-dependent crime?
Hacking
View source
What is an example of a cyber-enabled crime?
Identity theft
View source
How has the internet changed traditional crimes?
It has made them easier to
commit
View source
What are some contemporary examples of cybercrime?
Identity and data theft
Internet fraud
(online scams)
Hacking
Data breaches
View source
What percentage of the internet is visible?
5%
View source
What is the Deep Web?
Part of the internet not
indexed
by search engines
View source
What happens during a data breach?
A company's private records are accessed
illegally
View source
What is the annual cost of data breaches to companies?
Over
$2 trillion
annually
View source
How can stolen personal data be misused?
Used for
phishing
attempts or
identity theft
View source
What is a common type of phishing scam?
'You've won a prize'
emails
View source
What are some types of internet fraud?
Covid-19 scams
Get rich quick investment scams
Instagram influencer scams
Phishing scams
False shopping scams
Nigerian Romance (419) scam
View source
What is the 'Nigerian Romance' scam?
A scam
involving
fake
dating
profiles
View source
What is 'Scareware'?
Fake alerts claiming your computer is
infected
View source
How do scammers exploit the 'Scareware' tactic?
They gain access to victims'
computers
View source
What is the 'Microsoft Windows has been infected' scam?
A
scam
claiming
your
Windows software
is
infected
View source
What can happen if you fall for a 'Scareware' scam?
Scammers
may steal your personal data
View source
What are the consequences of internet fraud?
Financial loss
for victims
Emotional distress
Erosion of trust in online transactions
Increased security measures
View source
What is the 'Microsoft Windows has been infected' scam also known as?
Indian Call Centre
scam
View source
What do scammers do during the 'Indian Call Centre' scam?
They gain access to your
PC
and steal data
View source
What can scammers use stolen bank details for?
To steal money or create
fake accounts
View source
How did the victim in the BBC article lose money to a scammer?
By investing in a fake
currency trading scheme
View source
How much money did the victim lose to the Instagram scammer?
£17,000
View source
What is a notable statistic about Instagram accounts mentioned in the text?
Almost
half
of accounts are
fake
View source
Who is Kevin Poulson?
A famous hacker known for
ARPANET
hack
View source
What was the outcome of Kevin Poulson's hacking as a minor?
He was
caught
but
not prosecuted
View source
What did Kevin Poulson do at the age of 17?
He hacked into
ARPANET
,
The Pentagon's
system
View source
What is the significance of Kevin Poulson's story in understanding criminal behavior?
It provides insight into the
motivations
of hackers
View source
What is 'hactivism' commonly associated with?
The group
Anonymous
View source
What was a notable action taken by Anonymous around 2010?
They hacked
Scientology's
systems
View source
How has hactivism reportedly changed during the Covid-19 pandemic?
It has seen a
resurgence
View source
What can 3D printers be used to create illegally?
Guns,
access cards
, and drugs
View source
What is cyberwarfare?
Attacks by
nation states
on systems
View source
Which country has been accused of cyberwarfare recently?
Russia
View source
See all 47 cards