Types of Computer Fraud and Crimes Flashcards

1
Q

refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective.

A

HACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

A

PHISHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

refers to obtaining files that you do not have the right to use from the Internet.

A

ILLEGAL DOWNLOADING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

refers to the practice of illegally copying and selling digital music, video, computer software, etc.

A

DIGITAL PIRACY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is the deliberate use of someone else’s identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person’s name, and perhaps to the other person’s disadvantage or loss

A

IDENTITY THEFT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.

A

DISTRIBUTED DENIAL OF SERVICES (DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the art of manipulating people so they give up confidential information.

A

SOCIAL ENGINEERING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a booby trap in the form of an email attachment. If you download the attachment, it unleashes a virus on your computer. The virus may wipe files from system and suck up personal data for identity thieves.

A

TROJAN HORSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

can be Cyberstalking and Cyberbullying. These are not about stealing money or identities. They are personal attacks, targeting someone online just as some bullies and stalkers target victims offline.

A

CYBER-HARASSMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly