Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Cyber Crimes

15

Flashcards

0/15

Still learning
StarStarStarStar

Cyberespionage

StarStarStarStar

The practice of using computer networks to gain illicit access to confidential information, typically that held by a government or other organization. Example: Hacking government servers to steal sensitive diplomatic communications.

StarStarStarStar

Cyberterrorism

StarStarStarStar

The use of the internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm, in order to achieve political gains through intimidation. Example: Hacking into a dam's control systems to release water and cause flooding.

StarStarStarStar

Cryptojacking

StarStarStarStar

The unauthorized use of someone else’s computer to mine cryptocurrency. Example: A hacker installs mining software on a victim’s computer without their knowledge.

StarStarStarStar

Botnet

StarStarStarStar

A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages. Example: A collection of compromised computers sending millions of spam emails under the control of a hacker.

StarStarStarStar

Malware

StarStarStarStar

Software specifically designed to disrupt, damage, or gain unauthorized access to computer systems. Example: A virus that encrypts files and demands a ransom for decryption.

StarStarStarStar

Software Piracy

StarStarStarStar

The unauthorized copying, distribution, or use of software. Example: Downloading and using software without purchasing a legitimate license.

StarStarStarStar

DDoS Attack

StarStarStarStar

Distributed Denial of Service attack, where multiple compromised systems target a single system, causing a denial of service. Example: A website taken offline by overwhelming traffic from a botnet.

StarStarStarStar

SQL Injection

StarStarStarStar

A code injection technique that attacks data-driven applications by inserting malicious SQL statements into an entry field. Example: Entering code into a website’s search box that causes it to reveal sensitive database information.

StarStarStarStar

Credit Card Fraud

StarStarStarStar

The unauthorized use of a credit or debit card to fraudulently obtain money or property. Example: Skimming card details at an ATM and using them to make online purchases.

StarStarStarStar

Social Engineering

StarStarStarStar

Manipulating individuals into divulging confidential or personal information for fraudulent purposes. Example: Pretending to be a tech support agent to convince someone to install malicious software.

StarStarStarStar

Cyberstalking

StarStarStarStar

The use of the internet to stalk or harass an individual, group, or organization. Example: Sending threatening messages through social networks or email.

StarStarStarStar

Intellectual Property Theft

StarStarStarStar

Stealing or using someone else’s intellectual property without permission. Example: Copying and selling a company’s proprietary software.

StarStarStarStar

Phishing

StarStarStarStar

The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information. Example: Receiving an email that appears to be from your bank asking you to verify account details.

StarStarStarStar

Identity Theft

StarStarStarStar

The deliberate use of someone else's identity, typically to gain a financial advantage. Example: Using someone’s personal data to open new credit card accounts in their name.

StarStarStarStar

Online Scams

StarStarStarStar

Fraudulent schemes that deceive users into giving out personal information or money on the internet. Example: A fake lottery email asking for money to claim a prize.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.