ICT

    Cards (17)

    • Cybercrime
      Criminal activity that either targets or uses a computer, a computer network or a networked device
    • Types of cybercrime
      • Email and internet fraud
      • Identity fraud (where personal information is stolen and used)
      • Theft of financial or card payment data
      • Theft and sale of corporate data
      • Cyberextortion (demanding money to prevent a threatened attack)
      • Ransomware attacks (a type of cyberextortion)
      • Cryptojacking (where hackers mine cryptocurrency using resources they do not own)
      • Cyberespionage (where hackers access government or company data)
      • Interfering with systems in a way that compromises a network
      • Infringing copyright
      • Illegal gambling
      • Selling illegal items online
      • Soliciting, producing, or possessing child pornography
    • Malware attack
      A computer system or network is infected with a computer virus or other type of malware
    • Phishing
      A campaign where spam emails, or other forms of communication, are sent with the intention of tricking recipients into doing something that undermines their security
    • Distributed DoS attacks (DDoS)

      A type of cybercrime attack that cybercriminals use to bring down a system or network
    • Hacking
      Unauthorized use of someone else's computer or online account
    • Ways for hacking to happen
      • Installing a keystroke logger (keylogger) software
      • Using trial and error in the input of passwords
      • Using viruses to get into your computer to harvest information
    • Ways to lessen the risk of getting hacked
      • Use a password that is combination of letters and numbers
      • Use a strong anti-virus or firewall program
      • Never click on suspicious links
      • Don't give anyone access to your computer
      • Avoid keeping important accounts data in your computer
      • Be careful what you post and answer in social media
    • Signs of virus infection
      • Your computer runs slower than it used to be
      • Programs and applications take longer to load and sometimes refresh on their own or disappear from the taskbar
      • Certain files and data are deleted
      • Unusual files or directories appear on your system
      • Disk space and file names change for no reason
      • Strange text, images, and messages appear on your screen
      • Your computer shuts down unexpectedly or crashes frequently
    • Ways to protect your computer against viruses
      • Make sure your computer's firewall is always turned on
      • Use updated anti-virus software and perform a full computer virus scan regularly
      • Never open an e-mail attachment unless you know who sent it and you are expecting the attachment
      • Avoid using or downloading programs from unknown sources and stick to commercial software
      • Keep your operating system always up-to-date
      • Back up your files regularly
    • Spam
      The electronic equivalent of junk mail, flooding message accounts over the Internet with copies of the same message
    • Types of spam
      • Email spam (junk mail or unsolicited commercial e-mail)
      • Instant messaging spam (also called spim, sending unsolicited messages and links to millions of users)
      • Online game messaging spam (message flooding in chat rooms, public discussion areas, and private messaging functions of online games)
      • Search engine spam (spam sent via black hat or questionable search engine optimization techniques)
      • Blog and guestbook spam (template messages repeatedly posted in the comment sections and guest books)
      • Video site spam (messages posted with enticing text and images, usually promising videos of a sexually suggestive nature)
      • Virus spam (spam automatically received from someone else's computer)
    • What to do when spammed
      • Be selective when responding to messages
      • Be careful of signing up or posting to various websites
      • Create e-mail filters
      • Make sure not to aid in perpetuating forwarded messages
    • Frauds and scams
      Fake sellers who use computer service to promote bogus service, products, and investment opportunities, with the common goal of fooling you into giving away money and/or bank information
    • Guidelines to identify online frauds or scams
      • If something is too good to be true, then most likely it is
      • Be wary of products that are offered too cheap
      • Be cautious of buyers or sellers who have insufficient contact information provided on their sites
      • Research will go a long way
    • Common types of online frauds and scams
      • Get rich or deposit scams (scams that generally ask you to send money as "initial deposit" which allow you to earn much more)
      • Phishing email and website scams (emails and websites that resemble legitimate credit or bank authorities)
      • Winner or claim scam (email saying you've won, inherited, or are the recipient of something great)
      • Credit card scam (incredible offers of advanced fees paid for a guaranteed loan or credit card)
      • Auction fraud (you never get the product promised or bid on)
      • Employment scam (bogus job offers asking for personal data)
      • Lottery scam (intriguing emails saying you won a huge amount of money)
      • Travel scam (email with the offer of an amazing low airfare to an exotic destination)
      • Disaster relief scam (fake charity websites asking for donations)
    • Cyberstalking
      The use of the Internet by an individual or a group of individuals to harass another individual, group of individuals, or organization
    See similar decks