ICT

Cards (18)

  • Cybercrime
    Criminal activity that either targets or uses a computer, a computer network or a networked device
  • Types of cybercrime
    • Email and internet fraud
    • Identity fraud (where personal information is stolen and used)
    • Theft of financial or card payment data
    • Theft and sale of corporate data
    • Cyberextortion (demanding money to prevent a threatened attack)
    • Ransomware attacks (a type of cyberextortion)
    • Cryptojacking (where hackers mine cryptocurrency using resources they do not own)
    • Cyberespionage (where hackers access government or company data)
    • Interfering with systems in a way that compromises a network
    • Infringing copyright
    • Illegal gambling
    • Selling illegal items online
    • Soliciting, producing, or possessing child pornography
  • Malware attack
    A computer system or network is infected with a computer virus or other type of malware
  • Purposes of a computer compromised by malware
    • Stealing confidential data
    • Using the computer to carry out other criminal acts
    • Causing damage to data
  • Phishing
    A campaign where spam emails, or other forms of communication, are sent with the intention of tricking recipients into doing something that undermines their security
  • Distributed DoS attacks (DDoS)

    A type of cybercrime attack that cybercriminals use to bring down a system or network
  • Hacking
    Unauthorized use of someone else's computer or online account
  • Ways for hacking to happen
    • Installing a keystroke logger (keylogger) software
    • Using trial and error in the input of passwords
    • Using viruses to get into your computer to harvest information
  • Ways to lessen the risk of getting hacked
    • Use a password that is combination of letters and numbers
    • Use a strong anti-virus or firewall program
    • Never click on suspicious links
    • Don't give anyone access to your computer
    • Avoid keeping important accounts data in your computer
    • Be careful what you post and answer in social media
  • Signs of virus infection
    • Your computer runs slower than it used to be
    • Programs and applications take longer to load and sometimes refresh on their own or disappear from the taskbar
    • Certain files and data are deleted
    • Unusual files or directories appear on your system
    • Disk space and file names change for no reason
    • Strange text, images, and messages appear on your screen
    • Your computer shuts down unexpectedly or crashes frequently
  • Ways to protect your computer against viruses
    • Make sure your computer's firewall is always turned on
    • Use updated anti-virus software and perform a full computer virus scan regularly
    • Never open an e-mail attachment unless you know who sent it and you are expecting the attachment
    • Avoid using or downloading programs from unknown sources and stick to commercial software
    • Keep your operating system always up-to-date
    • Back up your files regularly
  • Spam
    The electronic equivalent of junk mail, flooding message accounts over the Internet with copies of the same message
  • Types of spam
    • Email spam (junk mail or unsolicited commercial e-mail)
    • Instant messaging spam (also called spim, sending unsolicited messages and links to millions of users through advanced software)
    • Online game messaging spam (all forms of message flooding in chat rooms, public discussion areas, and private messaging functions of online games)
    • Search engine spam (spam sent via black hat or questionable search engine optimization techniques to increase chances of ranking high in search engines)
    • Blog and guestbook spam (template messages repeatedly posted in the comment sections and guest books of blogs and websites)
    • Video site spam (messages posted with enticing text and images, usually promising videos of a sexually suggestive nature, to random users' online profiles)
    • Virus spam (spam automatically received from someone else's computer, usually through an e-mail message, or the kind that opens with a type of file)
  • What to do when spammed
    • Be selective when responding to messages
    • Be careful of signing up or posting to various websites
    • Create e-mail filters
    • Make sure not to aid in perpetuating forwarded messages
  • Frauds and scams
    Fake sellers who use computer service to promote bogus service, products, and investment opportunities, with the common goal of fooling you into giving away money and/or bank information
  • Guidelines to spot online frauds or scams

    • If something is too good to be true, then most likely it is
    • Be wary of products that are offered too cheap
    • Be cautious of buyers or sellers who have insufficient contact information provided on their sites
    • Research will go a long way
  • Common types of online frauds and scams
    • Get rich or deposit scams (scams that generally ask you to send money as "initial deposit" which allow you to earn much more)
    • Phishing email and website scams (emails and websites that resemble legitimate credit or bank authorities, tricking you into entering your ID and password)
    • Winner or claim scam (email saying you've won, inherited, or are the recipient of something great and you have to send a claim fee and/or provide your bank details)
    • Credit card scam (incredible offers of advanced fees paid for a guaranteed loan or credit card)
    • Auction fraud (you never get the product promised or bid on)
    • Employment scam (bogus job offers asking for your personal data)
    • Lottery scam (emails saying you won a huge amount of money and you must pay a processing fee to collect your winnings)
    • Travel scam (offers of amazing low airfare to an exotic destination with hidden high fees)
    • Disaster relief scam (fake charity websites asking for donations for disaster victims)
  • Cyberstalking
    The use of the Internet by an individual or a group of individuals to harass another individual, group of individuals, or organization