Gr 12 3.2 – COMPUTER CRIMES AND CRIMINALS Flashcards

1
Q

Botnet

A

A remotely controlled network of ‘zombie’ PCs (computers
infected with malware that enables criminals to use them
for launching DDOS attacks, sending out spam, ect.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cracker

A

Term no longer in general use, but which refers to a ‘bad’
hacker (‘black hat hacker’) who does illegal things such as
stealing or making unauthorised changes to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cyberbullying

A

The use of ICT tools and devices (cellphones, e-mail, social
media ect) to malign, mock, embarrass, threaten or
intimidate a person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cyber extortion

A

The use of IT-based blackmail, whereby threads are issues
ranging from the personal (e.g. release of unflattering
images) to the corporate (e.g DDOS attacks on websites) –
unless specified amounts of money are paid over to the
extortionist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cybergang

A

A group of people who help each other to commit
cybercrimes. Each member often specialises in a different
task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DDOS

A

Distributed Denial of Service: an ‘attack’ that makes a
website unavailable by the use of thousands or millions of
computers to request data from the site at the same time.
The servers become overloaded, unresponsive, and
effectively unavailable for everyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hacker

A

General term used for any person who uses ICT skills to
access computer systems, networks and information
illegally. Sometimes differentiated into two subcategories,
‘good’ hackers (‘white hat hackers’) and ‘bad’ hackers (‘black
hat hackers’)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identity theft

A

When someone steals your details (e.g ID document, driver’s
license, PIN code) in order to pretend to be you, and then
buys expensive goods in your name, or draws money from
your account, ect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Piggybacking

A

Gaining access to and using someone else’s Internet
connection without paying for it, most often through use of
an unsecured WiFi network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Script kiddies

A

Derogative term used for people who do not know how to
create a virus from scratch, but who obtain virus ‘templates’,
or pre-created ‘scripts’, which they modify and release.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spammer

A

Someone who sends out unsolicited (unasked-for /
unwanted e-mail – usually in the form of advertisements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virus author

A

Someone who writes the code for a computer virus (or other
form of malware).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly