L5

Cards (47)

  • Cybercrime denotes criminal activity where a computer or a network is the source, tool, target or crime place.
  • Cybercrime includes information technology infrastructure, including illegal access, data interference, system interference, misuse of devices, forgery, and electronic fraud.
  • The era of modern computer starts with analytical engine of Charles Babbage.
  • Joseph-Marie Jacquard in 1820 developed the first programmable loom that resulted in fear among Jacquards employees that their livelihood were threatened so they committed acts of sabotage to discourage Jacquard from further use of new technology.
  • May 3, 1978 was the birth of the spam e-mail wherein Gary Thuerk introduced his message to 400 of the 2600 people on ARPAnet, the DARPA-funded spam called The First Internet.
  • The first virus to affect apple computers was created by an 15 year old student named Rich Skrenta wherein he wrote the elk cloner virus. The virus that is capable of infecting the apple II computer boot sector and would display a short poem.
  • People commit cybercrime because of curiosity, fame-seeking, personal reasons such as stalking or emotional harassment. Financial gain was frequently identified as the prime motivator of cybercrime.
  • Hacking refers to testing and exploring computer systems, highly skilled computer programming or the practice of accessing and altering other people's computers.
  • Hacking may be carried out with ultimate aims or criminal intent.
  • Hacking refers to the practice of illegally accessing controlling or damaging other peoples computer system.
  • Hacker may use their technical knowledge or may employ any of the cybercrime tools and techniques.
  • Malware or malicious software enables unauthorized access to networks for different or a combination of purposes such as theft, sabotage, or spying.
  • Malware have 11 different variations.
  • Ransomware is a software that uses encryption to disable a target's access to its data until a ransom is paid.
  • In ransomware there is no guarantee that payment will result in the necessary decryption key or that the decryption key provided will function properly.
  • Fileless malware is the type of malware that doesn't install anything, instead it changes files that native to the operating system such as powershell or wmi
  • Fileless malware attack are stealthy and they are 10 times more successful than traditional malware attacks.
  • Spyware gathers information about users activities without their consent.
  • Spyware can include information such as passwords, pins, etc.
  • Spyware is not limited to the desktop computer it can also work in a critical app or on a mobile phone.
  • Adware tracks a user's surfing activity, though it is like spyware it doesn't install any software on a computer or capture keystrokes.
  • Adware danger is the eriosion of a user's privacy, the data captures is gathered, overtly, covertly.
  • Trojan disguises itself as a desirable code or software but once downloaded by computer users the trojan take hold of victims systems for malicious purposes.
  • Trojans may hide in games, apps, or maybe software patches or they'll be embedded in attachments included in phishing emails.
  • Worms install themselves into the network's target vulnerabilities in operating systems.
  • Worms gain access in several ways through backdoors built into the software, unintentional software vulnerabilities or flash drives.
  • Virus is a code that inserts itself into an application and executes when the application runs.
  • Virus may be used to steal data, launch DDoS, or even conduct ransomware.
  • Rootkits is a software that provides malicious actors remote of a victim's computer with full administrative priveleges.
  • Rootkits are often injected into applications, kernels, hypervisors, or firmware.
  • Rootkits spread through phishing, malicious attachments or downloads, and shared drives.
  • Keyloggers is a type of spyware that monitors user activity.
  • Keyloggers could have legitimate uses such as businesses uses them to monitor employees activities.
  • Keyloggers could be used for malicious purposes as it can be used in stealing passwords and other delicate information, it can be inserted into a system through phishing, social engineering, or malicious downloads.
  • Bots/Botnets is a software application that performs automated tasks on command.
  • Bots/Botnets are used for real purposes such as indexing search engines, but when used for malicious purposes they take the form of self-propagating malware.
  • Mobile Malware attacks targeting mobile devices have risen 50 percent since the last 2018, mobile malware threats are as many as those targeting desktops and include trojans, ransomware, advertising click fraud etc.
  • Mobile malware is a specific problem for jailbroken phones which tend to lack the default protections that were part of those devices original operating system
  • Piracy is the downloading and distribution of copyrighted media without paying for it. When people download or copy content such as music, books, games and other media they may be infringing on copyright laws.
  • Spam is the unsolicited e-mails or the electronic equivalent of junk mail. Spam is often spread in large amounts by sending out generic e-mails to large lists of email addresses.