Professional Documents
Culture Documents
Cyber Crime 5
Cyber Crime 5
Cyber Crime 5
13. Distributed De- seeks to gain control over multiple computers and then
nial of service uses there computers to launch an attack against specific
target or targets
1/3
Cyber Crime
Study online at https://quizlet.com/_frqnz
14. computer virus software program that is designed to spread itself to other
computers and to damage and disrupt a computer
15. worms type of malware that does not need to piggyback on a file
or program to replicate itself
16. Trojan horse malware named after a gift the Greeks gave to the citizens
of Troy during the trojan war
21. botnet A group of computers that have been infected with bot
malware without users' knowledge, enabling a hacker to
use the amassed resources of the computers to launch
distributed denial-of-service attacks, phishing campaigns
or spam.
2/3
Cyber Crime
Study online at https://quizlet.com/_frqnz
27. cyberstalking uses a computer to repeatedly harass or threaten another
person
28. cyberbullying use of email, instant messaging, chat rooms, and cell
phones to harass young people
3/3