ICT-RELATED-SOCIAL-ISSUES Flashcards
(16 cards)
also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.
Cybercrime
______ especially through the Internet has grown in importance as the computer has become central to commerce, entertainment, and government.
Cybercrime
Means the unauthorized or illegal copying, sharing or usage of copyright-protected software programs.
May be carried out by individuals, groups or, in some cases, organizations who then distribute the unauthorized software copies to users.
Software Theft
Is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.
Information Privacy or Data Privacy
Is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
Often sent via email, but it can also be distributed via text messages, phone calls, or social media.
Spam
Is a type of online scam where criminals impersonate legitimate organizations via email, text message, advertisement or other means in order to steal sensitive information.
Phishing
Is a form of online fraud involving malicious code and fraudulent websites. Cybercriminals install malicious code on your computer or server. The code automatically directs you to bogus websites without your knowledge or consent.
Pharming
Is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases.
Is committed in many different ways and its victims are typically left with damage to their credit, finances, and reputation.
Identity Theft
Is a collection of Internet-based websites that promote the personal and business-focused interaction of individuals around the world.
Social Media
THREATS OF SOCIAL MEDIA (6):
- Targeted Phishing Attacks
- Fake Accounts
- Celebrity name Misuse
- Site Compromise
- Social Media used spreading Spam and Malware
- Confidential Information Leak
Such attacks are carried out to steal money or confidential information, as was the case with the Hydraq attacks in early 2010 that compromised critical information of several multi national companies.
Targeted Phishing Attacks
In July 2010, a fake profile named Robin Sage was actively pushed to request connections to random people, which most people accepted without knowing who the fictitious woman was.
Fake Accounts
This is one of the popular social media threats of today. There have been several incidents of hackers registering a new account under the name of a celebrity.
Celebrity Name Misuse
In this social media threat, if an attacker compromises a social networking site with malicious code, any visitor to the site would be susceptible to attack.
Site Compromise
Social networking sites like Twitter and Facebook are often used to spread malware. The growing popularity of shortened URLs is also
giving rise to several social media threats. Cyber criminals often mask their links with a short URL making it difficult for the user to identify whether it is pointing to a legitimate or malicious site.
Social Media used spreading Spam and Malware
The scariest of social media threats is where employees start revealing seemingly uncritical technical information to the public. This could be a Twitter comment stating that the user is fed up configuring a particular firewall product at work or a status message indicating that the user finally found a way around a Web proxy product being used, and is nowable to post to his profile again.
Confidential Information Leak