Cyber Crime
Botherders
Use network of hijacked computers called zombies for internet attacks.
keylogger
a malicious program that records keystrokes.
hacker
computer user who seeks to gain unauthorized access to a computer system
vandalism
defacing websites
Controlled Substances
drugs whose manufacture, distribution, possession and use are tightly regulated by the government
Phishing
individuals deceive others by posing as legitimately established enterprises
Cybercrime
involves the use of the internet, computers, and related technologies in the commission of a crime.
malware
malicious software: viruses, worms, and Trojan horses
Trojan horse
malware named after a gift the Greeks gave to the citizens of Troy during the trojan war
Cyberextortion
occurs when someone uses a computer to attack or threaten to attack an individual, business, or organization if money is not provided to prevent or stop the attack
cyberprostitution
online prostitution
illegal prescription drug sales
online sale of prescription drugs
sniffers
programs used to monitor and analyze networks
Distributed Denial of service
seeks to gain control over multiple computers and then uses there computers to launch an attack against specific target or targets
organized crime
significant criminal activities by three or more persons in a group
computer virus
software program that is designed to spread itself to other computers and to damage and disrupt a computer
spyware
software that enables the remote monitoring of a computer user's activities or information on an individuals computer where this is software installed
Denial of service
the perpatrator seeks to prevent users of a particular service
Cyberterrorism
the politically motivated use of computers as weapons or as targets
botnet
A group of computers that have been infected with bot malware without users' knowledge, enabling a hacker to use the amassed resources of the computers to launch distributed denial-of-service attacks, phishing campaigns or spam.
illegal gambling
transmission of bets or wages via the internet
worms
type of malware that does not need to piggyback on a file or program to replicate itself
Embezzlement
type of theft in which an employee of a company transfers the company's financial assets to his or her own account
hacking
unauthorized intrusion into computers
Copyright infringement
unlawful copying of movies, tv shows, music, software, literature, and videogames
terrorism
unlawful use of force or violence against persons and/or property in the pursuit of political, religious, ideological or individual goals in order to intimidate or demoralize a government and its population
cyberbullying
use of email, instant messaging, chat rooms, and cell phones to harass young people
cyberstalking
uses a computer to repeatedly harass or threaten another person
Cyberharassment
uses the computer to bother another person
cracking
when a perpetrator seeks to gain unauthorized access to a computer in order to commit another crime
logic bomb
when triggered, it runs a dormant program