any illegal activity involving the use of a computer or other device
2
New cards
Hacking
attempting to gain unauthorised access to a computer system
3
New cards
Cyber stalking
the use of a network or other electronic communications to harass or scare someone
4
New cards
Data Theft
stealing data from a victim or organisation with the intent of obtaining private information
5
New cards
Denial of Service (DoS)
an attack meant to shut down a machine or network, making it inaccessible to its intended users. (repeatedly sending requests causes the server to be overloaded)
6
New cards
Distributed Denial of Service (DDoS)
the requests are sent by computers which have been infected with a virus
7
New cards
Digital Forgery
creating a copy of a document or other piece of media (such as images or videos) with the intent of profiting from it. Can be altered which can make a misrepresentation of the original copy.
8
New cards
Spamming
an email or other electronic message that is sent to a person who has not requested it.
9
New cards
Cyber defamation
the use of the internet to share false information that damages a person’s or business’s reputation.
10
New cards
Phishing
the practice of persuading individuals to disclose private information, such as bank account details or passwords.
11
New cards
Malware
the name for malicious software
12
New cards
Virus
a program designed to replicate and damage other computer systems and software.
13
New cards
Anti-virus
designed to detect, block and quarantine threats such as viruses.
14
New cards
Trojan Horse
software that seems legitimate but performs some malicious activity when it is run. It gains access to the computer usually without the user knowing.
15
New cards
Worm
computer malware that copies itself to spread to other computers by itself through a network. It requires bandwidth which can slower data transmission speeds.
16
New cards
Key Logger
software that records every individual key strokes from the user and is sent to the user who created the software. Used to steal passwords and other private information.
17
New cards
Spyware
software that is secretly installed onto a user's computer. It gathers information about the individual or organisation and sends it to someone who can use that information to harm the user.
18
New cards
bandwidth
the maximum amount of data transmitted over an internet connection in a given amount of time.
19
New cards
server
a software or hardware device that accepts and responds to requests made over a network by a user or another program, known as clients.
20
New cards
whistle blowing
a person, often an employee that reveals information about illegal, unsafe or immoral activity from a public or private organisation.
21
New cards
ransomware
Computer viruses that threaten to delete your files unless you pay a ransom. It encrypts those files and sometimes can make the computer unusable.