Cyber Crime (Chapters 15)

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

Hackers

Infiltrate or intrude into a network or computer

2
New cards

Computer Storage

Illegal movies, credit card info, kid porn, financial records

3
New cards

Cyber Crime

Illegal activity that occurs through the internet

4
New cards

Cyber Crimes

Crime where someone has special knowledge of Cyber space and is ever changing

5
New cards

Business E-Mail Compromise (BEC)

Exploit the fact that so many of us rely on e-mail to conduct business and it’s one of the most financially damaging online crimes

6
New cards

Identity theft

When someone steals your personal information, like your Social
Security number, and uses it to commit theft or fraud

7
New cards

Ransomware

A type of malicious software, or malware, that prevents you from accessing
your computer files, systems, or networks and demands you pay a ransom for their return

8
New cards

Spoofing

When someone disguises an email address, sender name, phone number, or website URL to convince you that you are interacting with a trusted source

9
New cards

Phishing

Use spoofing techniques to lure you in and get you to take the bait. These scams are designed to trick you into giving information to criminals that they shouldn’t have access to

10
New cards

Vishing Scams

Happen over the phone, voice email, or VoIP (voice over Internet Protocol) calls

11
New cards

Smishing Scams

Happen through SMS (text) messages

12
New cards

Pharming Scams

Happen when malicious code is installed on your computer to redirect you to fake websites

13
New cards

Online Predators

A growing threat to young people

14
New cards

Advance Fee Schemes

Occurs when the victim pays money to someone in anticipation of receiving something of greater value and then receives little or nothing in return

15
New cards

Charity and Disaster Fraud

Seek donations for organizations that do little or no work. While these scams can happen at any time, they are especially prevalent after high-profile disasters

16
New cards

Nigerian Letter or “419” Fraud

Combine the threat of impersonation fraud with a variation of an advance fee
scheme in which a letter mailed, or e-mailed, from Nigeria offers the recipient the “opportunity” to share in a percentage of millions of dollars that the author is
trying to transfer illegally out of Nigeria

17
New cards

Romance Scams

Occur when a criminal adopts a fake online identity to gain a victim’s affection and
trust. The scammer then uses the illusion of a romantic or close relationship to manipulate and/or steal from the victim

18
New cards

Computer Fraud and Abuse Act (CFAA)

It prohibits various computer-related conduct, including unauthorized access to protected computers

19
New cards

Computer Crime

Any illegal act for which knowledge of computer technology is used to commit the offense

20
New cards

Cyberbullying

Is similar to physical bullying but used technology for its bullying

21
New cards

Cyberstalking

The stalking or harassment of a person through the use of electronics

22
New cards

Federal Identity Theft Act

Makes it illegal to use or transfer another person's identification without authorization

23
New cards

Intellectual Property Theft

The unauthorized use, exploitation, or theft of creative works, ideas, trade secrets, and other proprietary information

24
New cards

Internet

An electronic communications network that connects computer networks and organizational computer facilities around the world

25
New cards

Scam

A deceptive scheme or trick used to cheat someone out of something

26
New cards

Data Diddling

Changing data before or during their entry into the computer

27
New cards

Trojan Horse

The covert placement of computer instructions into a computer program so that the computer will perform unauthorized functions while fulfilling its intended purpose

28
New cards

Salami Technique

An automatic means of stealing small amounts of assets from a large number of sources

29
New cards

Super Zapping

A utility program bypasses all controls in order to modify or disclose any of the contents of the computer

30
New cards

Trapdoors

An avenue into a computer program known only to one or a few person(s)

31
New cards

Logic Bomb

A computer program routine that, when executed, usually causes malicious acts to occur, such as erasing a file (or files) or causing the entire system to crash

32
New cards

Asynchronous Attack

Can override the priority basis and assign too much or too little of the computer’s resources to a particular job

33
New cards

Scavenging

A knowledgeable user searches the computer and its peripherals

34
New cards

Data Leakage

Techniques employed to remove data or copies of data from computer

35
New cards

Piggybacking and Impersonation

Physically or electronically gaining access to areas or data by following or posing as an authorized user

36
New cards

Wiretapping

Electronically tapping a computer facility or transmission wires going into and out of such a facility to obtain copies of data

37
New cards

Stimulation and Modeling

Using the computer’s capability to supply information to the perpetrator of a planned crime

38
New cards

Internet Crime Complaint Center (IC3)

Aids law enforcement in the various aspects of Internet fraud complaints

39
New cards

Computer Forensics

A component of forensic science which has a focus on obtaining legal evidence from computers and electronic devices