Information extortion occurs when an attacker or trusted insider steals data and demands compensation for its return. What is this crime called?

Prepare for the TESDA Computer System Servicing Test. Study with comprehensive materials, practice questions, and detailed explanations. Master the knowledge needed to excel at the exam!

Multiple Choice

Information extortion occurs when an attacker or trusted insider steals data and demands compensation for its return. What is this crime called?

Explanation:
This question tests understanding of cybercrime terminology around data theft and ransom. When an attacker steals data and then demands payment in exchange for returning it, the act is known as information extortion. The focus here is on exfiltrating data and using the threatened release or return as the leverage to coerce payment. This differs from ransomware, which centers on encrypting or locking data so the victim must pay to regain access. Phishing and social engineering describe methods used to deceive people into revealing credentials or access, but they don’t by themselves define the crime of stealing data for a ransom.

This question tests understanding of cybercrime terminology around data theft and ransom. When an attacker steals data and then demands payment in exchange for returning it, the act is known as information extortion. The focus here is on exfiltrating data and using the threatened release or return as the leverage to coerce payment.

This differs from ransomware, which centers on encrypting or locking data so the victim must pay to regain access. Phishing and social engineering describe methods used to deceive people into revealing credentials or access, but they don’t by themselves define the crime of stealing data for a ransom.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy