1/38
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Hackers
Infiltrate or intrude into a network or computer
Computer Storage
Illegal movies, credit card info, kid porn, financial records
Cyber Crime
Illegal activity that occurs through the internet
Cyber Crimes
Crime where someone has special knowledge of Cyber space and is ever changing
Business E-Mail Compromise (BEC)
Exploit the fact that so many of us rely on e-mail to conduct business and it’s one of the most financially damaging online crimes
Identity theft
When someone steals your personal information, like your Social
Security number, and uses it to commit theft or fraud
Ransomware
A type of malicious software, or malware, that prevents you from accessing
your computer files, systems, or networks and demands you pay a ransom for their return
Spoofing
When someone disguises an email address, sender name, phone number, or website URL to convince you that you are interacting with a trusted source
Phishing
Use spoofing techniques to lure you in and get you to take the bait. These scams are designed to trick you into giving information to criminals that they shouldn’t have access to
Vishing Scams
Happen over the phone, voice email, or VoIP (voice over Internet Protocol) calls
Smishing Scams
Happen through SMS (text) messages
Pharming Scams
Happen when malicious code is installed on your computer to redirect you to fake websites
Online Predators
A growing threat to young people
Advance Fee Schemes
Occurs when the victim pays money to someone in anticipation of receiving something of greater value and then receives little or nothing in return
Charity and Disaster Fraud
Seek donations for organizations that do little or no work. While these scams can happen at any time, they are especially prevalent after high-profile disasters
Nigerian Letter or “419” Fraud
Combine the threat of impersonation fraud with a variation of an advance fee
scheme in which a letter mailed, or e-mailed, from Nigeria offers the recipient the “opportunity” to share in a percentage of millions of dollars that the author is
trying to transfer illegally out of Nigeria
Romance Scams
Occur when a criminal adopts a fake online identity to gain a victim’s affection and
trust. The scammer then uses the illusion of a romantic or close relationship to manipulate and/or steal from the victim
Computer Fraud and Abuse Act (CFAA)
It prohibits various computer-related conduct, including unauthorized access to protected computers
Computer Crime
Any illegal act for which knowledge of computer technology is used to commit the offense
Cyberbullying
Is similar to physical bullying but used technology for its bullying
Cyberstalking
The stalking or harassment of a person through the use of electronics
Federal Identity Theft Act
Makes it illegal to use or transfer another person's identification without authorization
Intellectual Property Theft
The unauthorized use, exploitation, or theft of creative works, ideas, trade secrets, and other proprietary information
Internet
An electronic communications network that connects computer networks and organizational computer facilities around the world
Scam
A deceptive scheme or trick used to cheat someone out of something
Data Diddling
Changing data before or during their entry into the computer
Trojan Horse
The covert placement of computer instructions into a computer program so that the computer will perform unauthorized functions while fulfilling its intended purpose
Salami Technique
An automatic means of stealing small amounts of assets from a large number of sources
Super Zapping
A utility program bypasses all controls in order to modify or disclose any of the contents of the computer
Trapdoors
An avenue into a computer program known only to one or a few person(s)
Logic Bomb
A computer program routine that, when executed, usually causes malicious acts to occur, such as erasing a file (or files) or causing the entire system to crash
Asynchronous Attack
Can override the priority basis and assign too much or too little of the computer’s resources to a particular job
Scavenging
A knowledgeable user searches the computer and its peripherals
Data Leakage
Techniques employed to remove data or copies of data from computer
Piggybacking and Impersonation
Physically or electronically gaining access to areas or data by following or posing as an authorized user
Wiretapping
Electronically tapping a computer facility or transmission wires going into and out of such a facility to obtain copies of data
Stimulation and Modeling
Using the computer’s capability to supply information to the perpetrator of a planned crime
Internet Crime Complaint Center (IC3)
Aids law enforcement in the various aspects of Internet fraud complaints
Computer Forensics
A component of forensic science which has a focus on obtaining legal evidence from computers and electronic devices