Search Header Logo
Y7: Cracker vs hacker

Y7: Cracker vs hacker

Assessment

Presentation

Computers

7th Grade

Practice Problem

Medium

Created by

Enes Nas

Used 8+ times

FREE Resource

6 Slides • 14 Questions

1

Online Ethics

media

2

Rules to follow when using Online collab apps

  • Respect privacy

  • Avoid discrimination

  • Follow the law

  • Give credit

3

Multiple Choice

What are some important ethical considerations when using the Internet?

1

Respecting privacy

2

Discriminating based on age/nationality

3

Disregarding laws

4

Taking credit for others' work

4

Word Cloud

What rules should be followed when using collaborative applications online?
answer in 1 or 2 words

5

The Difference Between Hackers and Crackers

  • Hackers (White Hats) improve security.

  • Crackers (Black Hats) engage in malicious activities.

  • Grey Hats mix ethical and unethical actions.

media

6

Multiple Choice

Adrian intentionally accesses Maria’s email without her permission, searching for personal and financial details to use for his own benefit.

1
White hat hacker
2
Script kiddie
3
Gray hat hacker
4
Black hat hacker

7

The Internet has many security risks, such as fraud, phishing, and scams.

  • Phishing: Fake emails/websites to steal personal info.

  • Fraud: Deceptive tactics to get money or access.

  • Scams: Online schemes to steal sensitive data

8

Multiple Choice

What would you do if you receive an email asking you to confirm your login credentials?

1

Click the link

2

Ignore it

3

Reply for instructions

4

Report it as phishing

9

Ethical Issues in Online Collaboration

  • Privacy violations

  • Identity theft

  • Exploitation of personal information

  • Plagiarism

  • Cyberbullying

10

Reorder

Rank the following actions from most to least ethical in an online collaborative environment:

Respecting privacy

Helping someone who asks for assistance

Revealing someone’s private information without their consent

Claiming someone else’s work as your own

1
2
3
4

11

12

Multiple Choice

Alex: Accessing a friend's social media account without their permission

1

Cracker

2

Hacker

13

Multiple Choice

Sara: Asking a colleague to share their login credentials to check their emails

1

Cracker

2

Hacker

14

Multiple Choice

Lina: Informing the IT team about a vulnerability in the company's network after identifying it

1

Cracker

2

Hacker

15

Multiple Choice

Maya uses a vulnerability she found in a government website to access sensitive information. She doesn't report it to anyone but uses the information for personal gain

1

White Hat

2

Black Hat

3

Gray Hat

4

16

Multiple Choice

John discovers a weakness in a company's firewall but doesn’t exploit it. He accesses the system without permission and shows the company how they can fix it

1

White Hat

2

Black Hat

3

Gray Hat

4

17

Multiple Choice

Alex discovers a serious security flaw in an online banking system. Instead of exploiting it, he immediately informs the bank’s IT department so they can fix the issue and protect users from potential cyber threats.

1

White Hat

2

Black Hat

3

Gray Hat

18

Multiple Choice

Olivia accesses a friend's account on a social media platform to retrieve a forgotten password, thinking she is helping them, without the friend’s consent

1

White Hat

2

Black Hat

3

Gray Hat

19

Multiple Choice

Victor hacks into a competitor’s website to retrieve their customer data and uses it to launch his own product, gaining an unfair advantage in the market through unethical and illegal means

1

White Hat

2

Black Hat

3

Gray Hat

4

20

Multiple Choice

Emily is hired by a company to test the security of their website. She identifies vulnerabilities and suggests improvements without damaging any data

1

White Hat

2

Black Hat

3

Gray Hat

Online Ethics

media

Show answer

Auto Play

Slide 1 / 20

SLIDE