Cyberspace, network security and data transfer Flashcards
What is Cyber Crime?
Using a computer to commit a crime
Explain Hacking
Gaining unauthorised access to a computer with the intention of corrupting or stealing data stored on a hard drive
Explain Pornography
Hiding malware when someone downloads adult content which increases the risk of someone’s data being corrupted by a virus or stolen by an unauthorised data
Explain Cyber Stalking
Using technology to harass others such as sending inappropriate emails or making inappropriate comments on social media
Explain Data Theft
Theft of personal data which are then used to commit identity theft, eg passport applications
Explain Denial of Service
A malicious attack on a network, eg preventing users from logging on to access their data or email accounts
Explain Digital Forgery
Intentionally and falsely altering digital content. eg changing passport photographs and sell to criminals
Explain Cyber Defamation
Using the internet to intentionally damage the reputation of a person or organisation
Explain Spamming
Spamming is sending junk emails as a result the inbox becomes overloaded and time is wasted opening and reading such emails.
Explain Phishing
Sending emails that appear to be from a reliable source asking recipients to update their personal information which is then used by hackers
Explain Malware
Malware is a malicious software that is downloaded onto a computer unintentionally by using the internet or from email attachment
Explain Virus
Virus is a program that attaches itself into a file and once the file is opens it spreads itself to different computers on the same network
Explain Trojan Horse
Trojan horse gains entry to a user’s computer in disguise and tricks the user by encouraging them to open and download a software program that they require.
Explain Worms
Worms spread around a computer system by replicating itself. Spreads around the network without the need to be attached to any to any document or program
Explain Keylogger
Designed to record keyboard activities performed by users(known as ‘keystrokes’)
Keystrokes are saved as log file and then sent to the person who created the program
Main Purpose of Keyloggers
Steal Banking Information