-
Segment A
-
Segment B
<
>
Cyber Crimes
Questions
1. Before watching the BtN story predict what you think it is going to be about.
2. Discuss the issues raised in the story with another student.
3. Describe what a pirate is in the context of this story.
4. Someone who tries to scam you out of your personal details is referred to as a:
a. Trawler
b. Baiter
c. Phisher
5. Complete this sentence. Sometimes phishers use their phony emails to spread ____________.
6. Name one hacktivist group.
7. What are hacktivists trying to achieve by carrying out cyber attacks?
8. Why are governments around the world worried about APT’s (Advanced Persistent Threats)?
9. How did this story make you feel?
10. What do you understand more clearly since watching the BtN story?
2. Discuss the issues raised in the story with another student.
3. Describe what a pirate is in the context of this story.
4. Someone who tries to scam you out of your personal details is referred to as a:
a. Trawler
b. Baiter
c. Phisher
5. Complete this sentence. Sometimes phishers use their phony emails to spread ____________.
6. Name one hacktivist group.
7. What are hacktivists trying to achieve by carrying out cyber attacks?
8. Why are governments around the world worried about APT’s (Advanced Persistent Threats)?
9. How did this story make you feel?
10. What do you understand more clearly since watching the BtN story?
Cyber Crimes
Questions
1. What do you understand by cyber crime?
2. What is a digital identity?
3. What can happen if someone steals your identity online?
4. Describe what phishing is.
5. What is malware?
6. What is it designed to do?
7. Why are cyber police worried about wireless internet?
8. What does encryption do?
9. What sort of information can cyber crimiknals access if there is no encryption?
10. How could they use the information?
2. What is a digital identity?
3. What can happen if someone steals your identity online?
4. Describe what phishing is.
5. What is malware?
6. What is it designed to do?
7. Why are cyber police worried about wireless internet?
8. What does encryption do?
9. What sort of information can cyber crimiknals access if there is no encryption?
10. How could they use the information?