Cyber Crime 5

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Cyber Crime

Study online at https://quizlet.com/_frqnz

1. Cybercrime involves the use of the internet, computers, and related


technologies in the commission of a crime.

2. hacking unauthorized intrusion into computers

3. malware malicious software: viruses, worms, and Trojan horses

4. Cyberterrorism the politically motivated use of computers as weapons or


as targets

5. Cyberextortion occurs when someone uses a computer to attack or threat-


en to attack an individual, business, or organization if
money is not provided to prevent or stop the attack

6. vandalism defacing websites

7. cyberprostitu- online prostitution


tion

8. terrorism unlawful use of force or violence against persons and/or


property in the pursuit of political, religious, ideological
or individual goals in order to intimidate or demoralize a
government and its population

9. organized crime significant criminal activities by three or more persons in


a group

10. hacker computer user who seeks to gain unauthorized access to


a computer system

11. cracking when a perpetrator seeks to gain unauthorized access to


a computer in order to commit another crime

12. Denial of service the perpatrator seeks to prevent users of a particular


service

13. Distributed De- seeks to gain control over multiple computers and then
nial of service uses there computers to launch an attack against specific
target or targets

1/3
Cyber Crime
Study online at https://quizlet.com/_frqnz
14. computer virus software program that is designed to spread itself to other
computers and to damage and disrupt a computer

15. worms type of malware that does not need to piggyback on a file
or program to replicate itself

16. Trojan horse malware named after a gift the Greeks gave to the citizens
of Troy during the trojan war

17. logic bomb when triggered, it runs a dormant program

18. spyware software that enables the remote monitoring of a computer


user's activities or information on an individuals computer
where this is software installed

19. keylogger a malicious program that records keystrokes.

20. sniffers programs used to monitor and analyze networks

21. botnet A group of computers that have been infected with bot
malware without users' knowledge, enabling a hacker to
use the amassed resources of the computers to launch
distributed denial-of-service attacks, phishing campaigns
or spam.

22. Botherders Use network of hijacked computers called zombies for


internet attacks.

23. Copyright in- unlawful copying of movies, tv shows, music, software,


fringement literature, and videogames

24. Embezzlement type of theft in which an employee of a company transfers


the company's financial assets to his or her own account

25. Phishing individuals deceive others by posing as legitimately estab-


lished enterprises

26. Cyberharass- uses the computer to bother another person


ment

2/3
Cyber Crime
Study online at https://quizlet.com/_frqnz
27. cyberstalking uses a computer to repeatedly harass or threaten another
person

28. cyberbullying use of email, instant messaging, chat rooms, and cell
phones to harass young people

29. illegal prescrip- online sale of prescription drugs


tion drug sales

30. Controlled Sub- drugs whose manufacture, distribution, possession and


stances use are tightly regulated by the government

31. illegal gambling transmission of bets or wages via the internet

3/3

You might also like