3FL 2nd Test
3FL 2nd Test
3FL 2nd Test
Cyber crime is broadly defined as any illegal activity that involves a computer, another digital device or
a computer network. Cyber crime includes common cybersecurity threats like social engineering, software
vulnerability exploits and network attacks. But it also includes criminal acts like hacktivist protests,
harassment and extortion, money laundering, and more.
Cyber crime targets both individuals and companies. Typically, attackers target businesses for direct
financial gain or to sabotage or disrupt operations. They target individuals as part of large-scale scams, or to
compromise their devices and use them as a platform for nefarious activity.
One major example of cybercrime was in 2013-2016, Yahoo experienced a data breach which resulted in
the theft of 3 billion user accounts. For some of these accounts, the attackers got hold of private information
and passwords, which could be used to access user accounts in other online services.
www.exabeam.com
1. Write the letter that best completes the sentence :(2.25)
1- Cybercriminality ………… many other crimes. a-interferes with b-disrupts c-ends
2- Businesses and individuals are targeted by cybercrimes for………. reasons a- security b-
money c-communication
3- Cybercriminals infringed Yahoo ‘s data , many of them were used in………a-helping users to
log in b- breaching their online accounts c- creating other accounts
5. Find in the text words or phrases that are close in meaning to the following : (1.5)
a- Menaces (§1)=………. b-corrupt (§2)=……………. c-obtained (§3)=………………
Writing :
One of your friends has been a victim of cyberbullying. He told you the story and you decided to
write about it in your school magazine to help other kids from this dangerous silent crime .
Write a short article to explain to your mates the causes and consequences of the online crimes.
Illustrate using concrete examples .
…………………………………………………………………………………………………
………………………………………………………………………………………..
……………………………………………………………………………………..
……………………………………………………………………………………………..
……………………………………………………………………………………….
…………………………………………………………………………………….
…………………………………………………………………