問題一覧
1
is a term used to describe actions taken by someone to gain unauthorized access to a computer.
hacking
2
The availability of information online on the tools, techniques, and malware makes it easier for even non-technical people to undertake malicious activities.
hacking
3
The process by which cyber criminals gain access to your computer.
hacking
4
Find weaknesses or pre-existing bugs in your security settings and exploit them in order to access your information.
hacking
5
___providing a back door for hackers to enter and search for your information.
trojan horse
6
Install a Trojan horse, providing a back door for hackers to enter and search for your information.
hacking
7
is one of the more common ways to infiltrate or damage your computer.
malware
8
infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.
malware
9
Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information.
malware
10
Reformat the hard drive of your computer causing you to lose all your information.
malware
11
Alter or delete files.
malware
12
Steal sensitive information.
malware
13
Send emails on your behalf.
malware
14
Take control of your computer and all the software running on it.
malware
15
is a common type of online fraud.
pharming
16
A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
pharming
17
actual site down to the smallest details. You may enter your personal information and unknowingly give it to someone with malicious intent.
pharming
18
is used most often by cyber criminals because it's easy to execute and can produce the results they're looking for with very little effort.
phishing
19
Fake emails, text messages and websites created to look like they're from authentic companies.
phishing
20
They're sent by criminals to steal personal and financial information from you.
phishing
21
This is also known as "spoofing".
phishing
22
Trick you into giving them information by asking you to update, validate or confirm your account.
phishing
23
It is often presented in a manner than seems official and intimidating, to encourage you to take action.
phishing
24
Provides cyber criminals with your username and passwords so that they can access your accounts your online bank account, shopping accounts and steal your credit card numbers.
phishing
25
Is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.
ransomware
26
The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements.
ransomware
27
common types of ransomware:
1. Lockscreen ransomware 2. Encryption ransomware
28
displays an image that prevents you from accessing your computer
lockscreen ransomware
29
encrypts files on your system's hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them
encryption ransomware
30
will display a notification stating that your computer or data have been locked and demanding a payment be made for you to regain access.
ransomware
31
the notification states that authorities have detected illegal activity on your computer, and that the payment is a fine to avoid prosecution.
ransomware
32
is one of the more common methods of both sending information out and collecting it from unsuspecting people.
spam
33
The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs.
spam
34
Annoy you with unwanted junk mail.
spam
35
Create a burden for communications service providers and businesses to filter electronic messages.
spam
36
Phish for your information by tricking you into following links or entering details with too-good-to-be-true offers and promotions.
spam
37
Provide a vehicle for malware, scams, fraud and threats to your privacy.
spam
38
often used by third parties to infiltrate your computer.
Spy & adware
39
Software that collects personal information about you without you knowing.
Spyware & Adware
40
They often come in the form of a 'free' download and are installed automatically with or without your consent.
Spyware & Adware
41
These are difficult to remove and can infect your computer
Spyware & Adware
42
Collect information about you without you knowing about it and give it to third parties.
Spyware & Adware
43
Send your usernames, passwords, surfing habits, list of applications you've downloaded,
Spyware & Adware
44
Change the way your computer runs without your knowledge.
Spyware & Adware
45
Take you to unwanted sites or inundate you with uncontrollable pop-up ads.
Spyware & Adware
46
A malicious program that is disguised as, or embedded within, legitimate software.
trojan horses
47
It is an executable file that will install itself and run automatically once it's downloaded.
trojan horses
48
Delete your files.
trojan horses
49
Use your computer to hack other computers.
trojan horses
50
Watch you through your web cam.
trojan horses
51
Log your key strokes such as a credit card number you entered in an online purchase.
trojan horses
52
Record usernames, passwords and other personal information.
trojan horses
53
Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list.
virus
54
Send spam.
virus
55
Provide criminals with access to your computer and contact lists.
virus
56
Scan and find personal information like passwords on your computer.
virus
57
Hijack your web browser.
virus
58
Disable your security settings.
virus
59
Display unwanted ads.
virus
60
When a program is running, it could infiltrate your hard drive and also spread to USB keys and external hard drives.
virus
61
Any attachment you create using this program and send to someone else could also infect them
virus
62
is another method used by cyber criminals to capture personal information.
Wi-Fi Eavesdropping
63
Virtual "listening in" on information that's shared over an unsecure (not encrypted) WiFi network.
Wi-Fi Eavesdropping
64
Potentially access your computer with the right equipment.
Wi-Fi Eavesdropping
65
Steal your personal information including logins and passwords.
Wi-Fi Eavesdropping
66
are a common threat to computers and the Internet as a whole.
worms
67
goes to work on its own without attaching itself to files or programs.
worms
68
It lives in your computer memory, doesn't damage or alter the hard drive and propagates by sending itself to other computers in a network
worms
69
Spread to everyone in your contact list.
worms
70
Cause a tremendous amount of damage by shutting down parts of the Internet, wreaking havoc on an internal network and costing companies enormous amounts of lost revenue.
worms