Explore tens of thousands of sets crafted by our community.
Cyber Crime in Fiction
18
Flashcards
0/18
Malware Distribution
Explanation: Creating and spreading software designed to disrupt, damage, or gain unauthorized access to computer systems. Title: 'Daemon' by Daniel Suarez explores the havoc wreaked by a rogue program.
DDoS Attacks
Explanation: Overwhelming a system or network with a flood of Internet traffic to make it unavailable to users. Title: 'Freedom (TM)' by Daniel Suarez features this type of cyber activity.
Data Breaches
Explanation: Unauthorized access to organizational data stores, often to exfiltrate sensitive information. Title: 'Rogue Code' by Mark Russinovich deals with this type of cyber crime.
Cryptocurrency Theft
Explanation: The illegal acquisition of cryptocurrencies through hacking wallets or exchanges. Title: 'Cryptonomicon' by Neal Stephenson delves into early forms of electronic transactions that can be likened to cryptocurrency systems today.
Social Engineering
Explanation: The psychological manipulation of people into performing actions or divulging confidential information. Title: 'The Girl with the Dragon Tattoo' by Stieg Larsson intricately weaves this theme.
Online Harassment
Explanation: The use of the internet to harass, threaten, or maliciously target an individual or group. Title: 'Hate Crimes' by Pauline Gidget Estella touches on cyberstalkers and trolls.
Identity Theft
Explanation: The stealing of someone's personal data to impersonate them, often to access financial resources. Title: 'The Broken Window' by Jeffrey Deaver includes this form of cyber crime.
Credit Card Fraud
Explanation: Unauthorized use of a credit card to make purchases or withdraw funds. Title: 'Killerbyte' by Cat Connor involves this kind of cyber crime.
ATM Skimming
Explanation: The use of devices on ATMs to capture card information. Title: 'Nemesis' by Catherine Coulter delves into this form of cyber-enabled crime.
Election Interference
Explanation: The use of cyber tools to influence election outcomes or undermine electoral processes. Title: 'The People's House' by David Pepper tackles political intrigue and cyber manipulation.
Hacking into Government Systems
Explanation: Intruders gaining unauthorized access to national infrastructure or classified information. Title: 'Ghost in the Wires' by Kevin Mitnick features this type of cyber crime.
Software Piracy
Explanation: The unauthorized reproduction or distribution of copyrighted software. Title: 'The Fifth Estate' by Julian Assange addresses the consequences of this kind of cyber crime.
Insider Trading
Explanation: Using unauthorized access to confidential information to trade stocks or other securities for profit. Title: 'The Chairman' by Stephen Frey features a blend of financial intrigue and cyber crime.
Child Exploitation
Explanation: Using the internet to commit offenses against children, including grooming and the distribution of illegal materials. Title: 'The Bone Collector' by Jeffery Deaver, where the dark web plays a part.
Phishing Scams
Explanation: The use of fraudulent communication to extract sensitive data from individuals. Title: 'Dead Man's Switch' by Matthew Quirk showcases this type of cyber crime.
Ransomware Attacks
Explanation: Malicious software that locks data or systems until a ransom is paid. Title: 'Zero Day' by Mark Russinovich features this cyber crime narrative.
Corporate Espionage
Explanation: Infiltration of a company's networks to steal proprietary information or sabotage business operations. Title: 'The Director' by David Ignatius includes this cyber crime element.
Cyber Terrorism
Explanation: The use of internet-based attacks in terrorist activities, often targeting critical infrastructure. Title: 'Blackout' by Marc Elsberg depicts this type of cyber crime.
© Hypatia.Tech. 2024 All rights reserved.