Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Cyber Crime in Fiction

18

Flashcards

0/18

Still learning
StarStarStarStar

Malware Distribution

StarStarStarStar

Explanation: Creating and spreading software designed to disrupt, damage, or gain unauthorized access to computer systems. Title: 'Daemon' by Daniel Suarez explores the havoc wreaked by a rogue program.

StarStarStarStar

DDoS Attacks

StarStarStarStar

Explanation: Overwhelming a system or network with a flood of Internet traffic to make it unavailable to users. Title: 'Freedom (TM)' by Daniel Suarez features this type of cyber activity.

StarStarStarStar

Data Breaches

StarStarStarStar

Explanation: Unauthorized access to organizational data stores, often to exfiltrate sensitive information. Title: 'Rogue Code' by Mark Russinovich deals with this type of cyber crime.

StarStarStarStar

Cryptocurrency Theft

StarStarStarStar

Explanation: The illegal acquisition of cryptocurrencies through hacking wallets or exchanges. Title: 'Cryptonomicon' by Neal Stephenson delves into early forms of electronic transactions that can be likened to cryptocurrency systems today.

StarStarStarStar

Social Engineering

StarStarStarStar

Explanation: The psychological manipulation of people into performing actions or divulging confidential information. Title: 'The Girl with the Dragon Tattoo' by Stieg Larsson intricately weaves this theme.

StarStarStarStar

Online Harassment

StarStarStarStar

Explanation: The use of the internet to harass, threaten, or maliciously target an individual or group. Title: 'Hate Crimes' by Pauline Gidget Estella touches on cyberstalkers and trolls.

StarStarStarStar

Identity Theft

StarStarStarStar

Explanation: The stealing of someone's personal data to impersonate them, often to access financial resources. Title: 'The Broken Window' by Jeffrey Deaver includes this form of cyber crime.

StarStarStarStar

Credit Card Fraud

StarStarStarStar

Explanation: Unauthorized use of a credit card to make purchases or withdraw funds. Title: 'Killerbyte' by Cat Connor involves this kind of cyber crime.

StarStarStarStar

ATM Skimming

StarStarStarStar

Explanation: The use of devices on ATMs to capture card information. Title: 'Nemesis' by Catherine Coulter delves into this form of cyber-enabled crime.

StarStarStarStar

Election Interference

StarStarStarStar

Explanation: The use of cyber tools to influence election outcomes or undermine electoral processes. Title: 'The People's House' by David Pepper tackles political intrigue and cyber manipulation.

StarStarStarStar

Hacking into Government Systems

StarStarStarStar

Explanation: Intruders gaining unauthorized access to national infrastructure or classified information. Title: 'Ghost in the Wires' by Kevin Mitnick features this type of cyber crime.

StarStarStarStar

Software Piracy

StarStarStarStar

Explanation: The unauthorized reproduction or distribution of copyrighted software. Title: 'The Fifth Estate' by Julian Assange addresses the consequences of this kind of cyber crime.

StarStarStarStar

Insider Trading

StarStarStarStar

Explanation: Using unauthorized access to confidential information to trade stocks or other securities for profit. Title: 'The Chairman' by Stephen Frey features a blend of financial intrigue and cyber crime.

StarStarStarStar

Child Exploitation

StarStarStarStar

Explanation: Using the internet to commit offenses against children, including grooming and the distribution of illegal materials. Title: 'The Bone Collector' by Jeffery Deaver, where the dark web plays a part.

StarStarStarStar

Phishing Scams

StarStarStarStar

Explanation: The use of fraudulent communication to extract sensitive data from individuals. Title: 'Dead Man's Switch' by Matthew Quirk showcases this type of cyber crime.

StarStarStarStar

Ransomware Attacks

StarStarStarStar

Explanation: Malicious software that locks data or systems until a ransom is paid. Title: 'Zero Day' by Mark Russinovich features this cyber crime narrative.

StarStarStarStar

Corporate Espionage

StarStarStarStar

Explanation: Infiltration of a company's networks to steal proprietary information or sabotage business operations. Title: 'The Director' by David Ignatius includes this cyber crime element.

StarStarStarStar

Cyber Terrorism

StarStarStarStar

Explanation: The use of internet-based attacks in terrorist activities, often targeting critical infrastructure. Title: 'Blackout' by Marc Elsberg depicts this type of cyber crime.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.