Cyber Crime

Ace your homework & exams now with Quizwiz!

Botherders

Use network of hijacked computers called zombies for internet attacks.

keylogger

a malicious program that records keystrokes.

hacker

computer user who seeks to gain unauthorized access to a computer system

vandalism

defacing websites

Controlled Substances

drugs whose manufacture, distribution, possession and use are tightly regulated by the government

Phishing

individuals deceive others by posing as legitimately established enterprises

Cybercrime

involves the use of the internet, computers, and related technologies in the commission of a crime.

malware

malicious software: viruses, worms, and Trojan horses

Trojan horse

malware named after a gift the Greeks gave to the citizens of Troy during the trojan war

Cyberextortion

occurs when someone uses a computer to attack or threaten to attack an individual, business, or organization if money is not provided to prevent or stop the attack

cyberprostitution

online prostitution

illegal prescription drug sales

online sale of prescription drugs

sniffers

programs used to monitor and analyze networks

Distributed Denial of service

seeks to gain control over multiple computers and then uses there computers to launch an attack against specific target or targets

organized crime

significant criminal activities by three or more persons in a group

computer virus

software program that is designed to spread itself to other computers and to damage and disrupt a computer

spyware

software that enables the remote monitoring of a computer user's activities or information on an individuals computer where this is software installed

Denial of service

the perpatrator seeks to prevent users of a particular service

Cyberterrorism

the politically motivated use of computers as weapons or as targets

botnet

A group of computers that have been infected with bot malware without users' knowledge, enabling a hacker to use the amassed resources of the computers to launch distributed denial-of-service attacks, phishing campaigns or spam.

illegal gambling

transmission of bets or wages via the internet

worms

type of malware that does not need to piggyback on a file or program to replicate itself

Embezzlement

type of theft in which an employee of a company transfers the company's financial assets to his or her own account

hacking

unauthorized intrusion into computers

Copyright infringement

unlawful copying of movies, tv shows, music, software, literature, and videogames

terrorism

unlawful use of force or violence against persons and/or property in the pursuit of political, religious, ideological or individual goals in order to intimidate or demoralize a government and its population

cyberbullying

use of email, instant messaging, chat rooms, and cell phones to harass young people

cyberstalking

uses a computer to repeatedly harass or threaten another person

Cyberharassment

uses the computer to bother another person

cracking

when a perpetrator seeks to gain unauthorized access to a computer in order to commit another crime

logic bomb

when triggered, it runs a dormant program


Related study sets

Module #18 - be able to do a simple sort

View Set

Theory Module 2- The art and science of social research

View Set

Fundamentals of Nursing Ch 1,2,5

View Set

The American Political System - Chapter 13 Terms

View Set

AP Euro ch. 19 (French Revolution)

View Set