
Cybercrime
Presentation
•
Computers
•
9th Grade
•
Medium
Luca Longo
Used 13+ times
FREE Resource
12 Slides • 11 Questions
1
Cybercrime
by Luca Longo
2
Multiple Choice
A hacker that uses illegal and/or unethical means to discover a system’s security vulnerabilities. Typically, this type of hacker accesses systems illegally—without permission—but then share their findings and report problems they find is a
A.
Unauthorized
Hacker
B.
Authorized Hacker
C.
In between
D.
client
3
A is incorrect: because an Unauthorized Hacker is an unethical criminal hacker who breaks laws, steals data, holds information for ransom, and commits other criminal acts
C is correct: because an In between is a hacker uses illegal and/or unethical means to discover a system’s security vulnerabilities
D is incorrect: because a client is a desktop computer or workstation that is capable of obtaining information and applications from a server.
B is incorrect: because an Authorized Hacker is an ethical cybersecurity expert who has permission to perform security tests and who fully discloses their activities
4
Multiple Choice
a desktop computer or workstation that is capable of obtaining information and applications from a server
A.
Unauthorized
Hacker
B.
Authorized Hacker
C.
In between
D.
client
5
A is incorrect: because an Unauthorized Hacker is an unethical criminal hacker who breaks laws, steals data, holds information for ransom, and commits other criminal acts
B is incorrect: because an Authorized Hacker is an ethical cybersecurity expert who has permission to perform security tests and who fully discloses their activities
C is incorrect: because an In between is a hacker uses illegal and/or unethical means to discover a system’s security vulnerabilities
D is correct: because a client is a desktop computer or workstation that is capable of obtaining information and applications from a server..
6
Multiple Choice
an unethical criminal hacker who breaks laws, steals data, holds information for ransom, and commits other criminal acts, is a?
A.
Unauthorized
Hacker
B.
In between
c.
client
D.
Authorized
Hacker
7
A is correct: because an Unauthorized Hacker is an unethical criminal hacker who breaks laws, steals data, holds information for ransom, and commits other criminal acts
B is incorrect: because an In between is a hacker uses illegal and/or unethical means to discover a system’s security vulnerabilities
C is incorrect: because a client is a desktop computer or workstation that is capable of obtaining information and applications from a server.
D is incorrect: because an Authorized Hacker is an ethical cybersecurity expert who has permission to perform security tests and who fully discloses their activities
8
Multiple Choice
an ethical cybersecurity expert who has permission to perform security tests and who fully discloses their activities. They report vulnerabilities and improve the security of a system. Their behavior is noble and their actions align with society’s greater good
A.
Unauthorized
Hacker
B.
Authorized Hacker
C.
In between
D.
client
9
A is incorrect: because an Unauthorized Hacker is an unethical criminal hacker who breaks laws, steals data, holds information for ransom, and commits other criminal acts
B is correct: because an Authorized Hacker is an ethical cybersecurity expert who has permission to perform security tests and who fully discloses their activities
C is incorrect: because an In between is a hacker uses illegal and/or unethical means to discover a system’s security vulnerabilities
D is incorrect: because a client is a desktop computer or workstation that is capable of obtaining information and applications from a server..
10
Multiple Choice
a relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites, according to the programming and hacking cultures
A.
hacktivism
B.
script kiddie
C.
Insider
D.
cyber syndicate
11
A is incorrect: because a hacktivism is a person who gains unauthorized access to computer files or networks in order to further social or political ends.
B is correct: because a script kiddie is a relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites, according to the programming and hacking cultures
C is incorrect: because a Insider is a member of any group of people of limited number and generally restricted access
D is incorrect: because a cyber syndicate is an organized criminal groups who use spam, spyware and malware, and other types of cyber tools to engage in criminal conduct
12
Multiple Choice
an organized criminal groups who use spam, spyware and malware, and other types of cyber tools to engage in criminal conduct
A.
hacktivism
B.
script kiddie
C.
Insider
D.
cyber syndicate
13
A is incorrect: because a hacktivism is a person who gains unauthorized access to computer files or networks in order to further social or political ends.
B is incorrect: because a script kiddie is a relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites, according to the programming and hacking cultures
C is incorrect: because a Insider is a member of any group of people of limited number and generally restricted access
D is correct: because a cyber syndicate is an organized criminal groups who use spam, spyware and malware, and other types of cyber tools to engage in criminal conduct
14
Multiple Choice
a person who gains unauthorized access to computer files or networks in order to further social or political ends
A.
hacktivism
B.
script kiddie
C.
Insider
D.
cyber syndicate
15
A is correct: because a hacktivism is a person who gains unauthorized access to computer files or networks in order to further social or political ends.
B is incorrect: because a script kiddie is a relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites, according to the programming and hacking cultures
C is incorrect: because a Insider is a member of any group of people of limited number and generally restricted access
D is incorrect: because a cyber syndicate is an organized criminal groups who use spam, spyware and malware, and other types of cyber tools to engage in criminal conduct
16
Multiple Choice
a member of any group of people of limited number and generally restricted access
A.
hacktivism
B.
script kiddie
C.
Insider
D.
cyber syndicate
17
A is incorrect: because a hacktivism is a person who gains unauthorized access to computer files or networks in order to further social or political ends.
B is incorrect: because a script kiddie is a relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites, according to the programming and hacking cultures
C is correct: because a Insider is a member of any group of people of limited number and generally restricted access
D is incorrect: because a cyber syndicate is an organized criminal groups who use spam, spyware and malware, and other types of cyber tools to engage in criminal conduct
18
Multiple Select
the career of an Authorized Hacker is
Can provide reliable, stable lifestyle
May never get
hired anywhere
Many rewarding career
opportunities
Lifetime of
earning
Jobs are worldwide, free to live
anywhere
19
The career of an Authorized Hacker is
Can provide reliable, stable lifestyle
Many rewarding career opportunities
Lifetime of earning
Jobs are worldwide, free to live anywhere
The career of an Unauthorized Hacker is
May never get hired anywhere
Causes dangerous, unstable lifestyle
Unpredictable opportunities and rewards
Fugitive from the law, possible jail time
20
Multiple Choice
the practice of spying or using spies to obtain information about the plans and activities especially of a foreign government or a competing company
A.
hacktivism
B.
warfare/espionage
C.
Insider
D.
cyber syndicate
21
A is incorrect: because a hacktivism is a person who gains unauthorized access to computer files or networks in order to further social or political ends.
B is correct: because a warfare/espionage is the practice of spying or using spies to obtain information about the plans and activities especially of a foreign government or a competing company
C is correct: because a Insider is a member of any group of people of limited number and generally restricted access
D is incorrect: because a cyber syndicate is an organized criminal groups who use spam, spyware and malware, and other types of cyber tools to engage in criminal conduct
22
Multiple Select
the career of an Unauthorized Hacker is
Causes dangerous, unstable lifestyle
May never get
hired anywhere
Lifetime of
earning
Unpredictable opportunities and rewards
Fugitive from the law, possible jail time
23
The career of an Authorized Hacker is
Can provide reliable, stable lifestyle
Many rewarding career opportunities
Lifetime of earning
Jobs are worldwide, free to live anywhere
The career of an Unauthorized Hacker is
May never get hired anywhere
Causes dangerous, unstable lifestyle
Unpredictable opportunities and rewards
Fugitive from the law, possible jail time
Cybercrime
by Luca Longo
Show answer
Auto Play
Slide 1 / 23
SLIDE
Similar Resources on Wayground
18 questions
Сортировка 9 класс
Presentation
•
9th Grade
18 questions
MAINTAIN COMPUTER EQUIPMENT AND SYSTEMS
Presentation
•
9th - 10th Grade
19 questions
[igCS] Analog and digital
Presentation
•
9th Grade
18 questions
Biogeochemical Cycles
Presentation
•
9th Grade
18 questions
Polynomial operations Review
Presentation
•
9th Grade
18 questions
Mother to Son
Presentation
•
9th Grade
18 questions
Entrepreneurship: Creating a Business Plan
Presentation
•
9th Grade
18 questions
La técnica como sistema, clases de técnicas y sus elementos
Presentation
•
9th Grade
Popular Resources on Wayground
15 questions
Grade 3 Simulation Assessment 1
Quiz
•
3rd Grade
22 questions
HCS Grade 4 Simulation Assessment_1 2526sy
Quiz
•
4th Grade
16 questions
Grade 3 Simulation Assessment 2
Quiz
•
3rd Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2526sy
Quiz
•
5th Grade
17 questions
HCS Grade 4 Simulation Assessment_2 2526sy
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
24 questions
HCS Grade 5 Simulation Assessment_2 2526sy
Quiz
•
5th Grade
20 questions
Math Review
Quiz
•
3rd Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
20 questions
Inventor Terms Exercise #1a
Quiz
•
9th Grade
31 questions
Inventor Vocabulary Review Sheet
Quiz
•
9th Grade
10 questions
Exploring Cybersecurity Techniques and Threats
Interactive video
•
6th - 10th Grade