Cybercrime v2 Flashcards
Crimes that are committed by the cyber criminals against an individual or a person
Crime against the Individuals
These types of crimes includes vandalism of computers, Intellectual (Copyright, patented, trademark etc) Property Crimes, Online threatening etc.
Crimes against Property
Crimes done to threaten the international governments or any organization by using internet facilities.
Crime against Organization
Those cybercrimes which affects the society interest at large
Crimes Against Society
Large group of computers, controlled from remote locations by hackers, without the knowledge or consent of their owners
Botnets
Malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks
Distributed Denial-of-Service (DDoS) Attacks
Set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge
Rootkits
a variation of phishing in which the phisher sends fraudulent emails to a certain organization’s employees.
Spear phishing
another variation of phishing that involves the use of Short Message Service (SMS) texting.
Smishing
similar to smishing except that the victims receive a voice mail telling them to call a phone number or access a Web site
Vishing
is a person who conducts some form of illegal activity using computers or the Internet.
cybercriminal
explore others’ computer systems for various reasons
Hackers
an ethical hacker who opposes the abuse of computer systems and networks.
White hat hackers
a hacker who compromises or breaks into the security of a computer system or network without the permission of authorized party, typically with malicious intent.
Black hat hacker
a hacker who sometimes acts legally, sometimes illegally. They are a hybrid between white and black hat hackers.
Grey hat hackers
These individuals intentionally cause loss to satisfy some antisocial motives or sometimes just for fun.
Crackers
These individuals perpetrate tricks on others.
Pranksters
These individuals earn part or all of their income from crime.
Career criminals
a hacker may break into a government website to steal information or to post a threat.
Cyber terrorists
Name calling in chat rooms, posting fake profiles on websites, and sending mean or cruel emails or messages are some forms of cyberbullying and cyber bulls indulge in such activities.
Cyber bulls
Those attacks are used for the commission of financial crimes.
Salami attackers
These individuals convert the ‘virtual money’ or cryptocurrency into real cash
Drops
They produce ready-to-use tools such as trojans, mailers, custom bots, viruses and other services and sell them to the cyber crime labour force.
Coders
a method of computing that delivers secure, private, and reliable computing experiences based on sound business practices—which is what organizations worldwide are demanding
today.
Trustworthy computing