Types of Computer Fraud and Crimes Flashcards
refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective.
HACKING
is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
PHISHING
refers to obtaining files that you do not have the right to use from the Internet.
ILLEGAL DOWNLOADING
refers to the practice of illegally copying and selling digital music, video, computer software, etc.
DIGITAL PIRACY
is the deliberate use of someone else’s identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person’s name, and perhaps to the other person’s disadvantage or loss
IDENTITY THEFT
is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.
DISTRIBUTED DENIAL OF SERVICES (DDoS
the art of manipulating people so they give up confidential information.
SOCIAL ENGINEERING
a booby trap in the form of an email attachment. If you download the attachment, it unleashes a virus on your computer. The virus may wipe files from system and suck up personal data for identity thieves.
TROJAN HORSE
can be Cyberstalking and Cyberbullying. These are not about stealing money or identities. They are personal attacks, targeting someone online just as some bullies and stalkers target victims offline.
CYBER-HARASSMENT