Chapter Fourteen Flashcards
cybercrime
the use of modern technology for criminal purposes
cybertheft
use of computer networks for criminal profits. Illegal copyright infringement, identity theft, and internet securities fraud are examples
cybervandalism
malicious attacks aimed at disrupting, defacing, and destroying technology
cyberwar
using cyberspace for acts of war, including spying and disrupting an enemy’s computer network
cyberterrorism
internet attacks against an enemy nation’s technological infrastructure
ATM skimming
using an electronic device or camera of an ATM that copies information from a bank card’s magnetic strip whenever a customer uses the machine or photographs their key strokes
darknet
computer network that can only be accessed using nonstandard communications protocols and ports with restricted access that can only be opened with specific software configurations
denial-of-service attacks
extorting money from an Internet service user by threatening to prevent the user from having access to the service
warez
a term used by computer hackers and software pirates to describe a game or application that is made available for use on the Internet in violation of its copyright protection
identity theft
using the internet to steal someone’s identity and/or impersonate the victim in order to conduct illicit transactions such as committing fraud using the victim’s name and identity
phishing
sometimes called carding or brand spoofing. It is a scam where the perpetrator sends out emails appearing to come from legitimate web enterprises in an effort to get the recipient to reveal personal and financial information
spear-phishing
targeting specific victims, sending them emails that contain accurate information about their lives obtained from social networking sites, and asking them to open an email attachment where malware harvests details such as usernames, passwords, bank account details, credit card numbers, and other personal information
etailing fraud
illegally buying and/or selling merchandise on the Internet
malware
a malicious software program
computer worms
programs that attack computer networks by self-replicating and sending themselves to other users, generally via email, without the aid of the operator