Explore tens of thousands of sets crafted by our community.
Cyber Crimes
15
Flashcards
0/15
Cyberespionage
The practice of using computer networks to gain illicit access to confidential information, typically that held by a government or other organization. Example: Hacking government servers to steal sensitive diplomatic communications.
Cyberterrorism
The use of the internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm, in order to achieve political gains through intimidation. Example: Hacking into a dam's control systems to release water and cause flooding.
Cryptojacking
The unauthorized use of someone else’s computer to mine cryptocurrency. Example: A hacker installs mining software on a victim’s computer without their knowledge.
Botnet
A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages. Example: A collection of compromised computers sending millions of spam emails under the control of a hacker.
Malware
Software specifically designed to disrupt, damage, or gain unauthorized access to computer systems. Example: A virus that encrypts files and demands a ransom for decryption.
Software Piracy
The unauthorized copying, distribution, or use of software. Example: Downloading and using software without purchasing a legitimate license.
DDoS Attack
Distributed Denial of Service attack, where multiple compromised systems target a single system, causing a denial of service. Example: A website taken offline by overwhelming traffic from a botnet.
SQL Injection
A code injection technique that attacks data-driven applications by inserting malicious SQL statements into an entry field. Example: Entering code into a website’s search box that causes it to reveal sensitive database information.
Credit Card Fraud
The unauthorized use of a credit or debit card to fraudulently obtain money or property. Example: Skimming card details at an ATM and using them to make online purchases.
Social Engineering
Manipulating individuals into divulging confidential or personal information for fraudulent purposes. Example: Pretending to be a tech support agent to convince someone to install malicious software.
Cyberstalking
The use of the internet to stalk or harass an individual, group, or organization. Example: Sending threatening messages through social networks or email.
Intellectual Property Theft
Stealing or using someone else’s intellectual property without permission. Example: Copying and selling a company’s proprietary software.
Phishing
The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information. Example: Receiving an email that appears to be from your bank asking you to verify account details.
Identity Theft
The deliberate use of someone else's identity, typically to gain a financial advantage. Example: Using someone’s personal data to open new credit card accounts in their name.
Online Scams
Fraudulent schemes that deceive users into giving out personal information or money on the internet. Example: A fake lottery email asking for money to claim a prize.
© Hypatia.Tech. 2024 All rights reserved.