VT Chapter 10 Flashcards
(52 cards)
cybercrime
criminal activity on the internet
cyber bullying
between minors
cyber harassment
between adults
cyber stalking
stalker demonstrates a pattern of harassment that poses a credible threat of harm
phishing
uses email message or IMs that appear to be from someone you know to trick you into revealing personal information
pharming
redirects you to a phony website by hijacking the domain name or poisoning the DNS server references to a site
clickjacking
when clicking on a link allows malware to post unwanted links on your page
computer fraud
convince a victim to voluntarily give money or property to another person
shill bidding
fake bidding by the seller or an accomplice to drive up the price of an auction item
Identity theft
someone fraudulently uses your name, Soc., or bank/credit card
keyloggers
programs or devices that capture what is typed on a keyboard
hacking
act of gaining unauthorized access to a computer system or network
Hacktivism
hacking to make a political statement
data breach
when sensitive data is stolen or viewed by someone who is not authorized to do so
cyber terrorism
unlawful attack on computers or networks to intimidate a government or its people for a political or social agenda
_________ is criminal activity on the internet.
Cybercrime
_______ gain unauthorized access to computer systems or networks.
Hackers
A _______ exposes sensitive data to unauthorized eyes
data breach
malware
malicious software
spamming
sending mass unsolicited emails
spam
junk mail
cookie
small text file placed on your computer when you visit a website that helps identify you when you return
Adware
pop ups or banner ads on websites or in software
Spyware
form of malware that secretly gathers personal information about you