Explore tens of thousands of sets crafted by our community.
Cyber Crimes
15
Flashcards
0/15
Malware
Software specifically designed to disrupt, damage, or gain unauthorized access to computer systems. Example: A virus that encrypts files and demands a ransom for decryption.
SQL Injection
A code injection technique that attacks data-driven applications by inserting malicious SQL statements into an entry field. Example: Entering code into a website’s search box that causes it to reveal sensitive database information.
Online Scams
Fraudulent schemes that deceive users into giving out personal information or money on the internet. Example: A fake lottery email asking for money to claim a prize.
Social Engineering
Manipulating individuals into divulging confidential or personal information for fraudulent purposes. Example: Pretending to be a tech support agent to convince someone to install malicious software.
DDoS Attack
Distributed Denial of Service attack, where multiple compromised systems target a single system, causing a denial of service. Example: A website taken offline by overwhelming traffic from a botnet.
Cryptojacking
The unauthorized use of someone else’s computer to mine cryptocurrency. Example: A hacker installs mining software on a victim’s computer without their knowledge.
Identity Theft
The deliberate use of someone else's identity, typically to gain a financial advantage. Example: Using someone’s personal data to open new credit card accounts in their name.
Intellectual Property Theft
Stealing or using someone else’s intellectual property without permission. Example: Copying and selling a company’s proprietary software.
Cyberespionage
The practice of using computer networks to gain illicit access to confidential information, typically that held by a government or other organization. Example: Hacking government servers to steal sensitive diplomatic communications.
Phishing
The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information. Example: Receiving an email that appears to be from your bank asking you to verify account details.
Cyberstalking
The use of the internet to stalk or harass an individual, group, or organization. Example: Sending threatening messages through social networks or email.
Software Piracy
The unauthorized copying, distribution, or use of software. Example: Downloading and using software without purchasing a legitimate license.
Botnet
A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages. Example: A collection of compromised computers sending millions of spam emails under the control of a hacker.
Cyberterrorism
The use of the internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm, in order to achieve political gains through intimidation. Example: Hacking into a dam's control systems to release water and cause flooding.
Credit Card Fraud
The unauthorized use of a credit or debit card to fraudulently obtain money or property. Example: Skimming card details at an ATM and using them to make online purchases.
© Hypatia.Tech. 2024 All rights reserved.