Finals 2 Flashcards
Alternatively known as cyber crime, e-crime, electronic crime, or hi-tech crime.
Computer Crime
is an act performed by an educated computer user, sometimes called a “hacker,” that wrongfully browses or takes an organization’s or a person’s confidential data.
Computer Crime
Sometimes, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.
Computer Crime
In most cases, someone commits a computer crime to obtain…
goods or money
are strong inspirations for certain individuals to try stealing through computer crimes.
Greed and desperation
Certain individuals may likewise commit a computer wrongdoing since they are ___, to do so by someone else
pressured, or forced
Certain individuals commit computer crimes to demonstrate they can ___.
make it happen
An individual who can effectively execute a computer crime might track down incredible ___.
individual satisfaction
These sorts of individuals, called ___ like to create chaos and unleash devastation on others and organizations.
black hat hackers
Another explanation computer crimes are sometimes committed is because they are ___. They want something to do and do not care if they commit a crime.
bored (exhausted)
Making, distributing, storing, or viewing child pornography.
Child pornography
Fraudulent clicks on Internet advertisements.
Click fraud
Stealing or using another person’s Copyrighted material without permission.
Copyright violation
Breaking or deciphering codes designed to protect data.
Cracking
Computer fraud involving the intentional falsification of numbers in data entry.
Data diddling
Releasing another person’s personal information without their permission.
Doxing
A type of graffiti that uses projectors or lasers to project an image or message onto a building.
Green Graffiti
Collect account or account-related information on other people.
Harvesting
An intellectual property rights violation is any infringement of another’s Copyright, patent, or trademark.
IPR violation
SMS scam to get people to invest into a crypto currency scam.
Pig butchering
Stealing tiny amounts of money from each transaction.
Salami slicing
The act of calling in a false police report to someone else’s home.
Swatting
Setting up a domain that is a misspelling of another domain.
Typo-squatting
Connecting a device to a phone line to listen to conversations.
Wiretapping