M7 Computer Crimes
doxing
Releasing another person's personal information without their permission.
cracker
a person who breaks into a computer system, typically for n illegal purpose
worm
A destructive program that replicates itself throughout a single computer or across a network-both wired and wireless
spoofing
Deceiving a system into thinking you are someone you're not.
static
IP address and IP address that does not change
ISP
Internet Service Provider, provides access to the internet.
denial-of-service (DoS) attack
Large-scale attack using multiple unique IP addresses or machines, sometimes thousands, overloading a system with so many requests it cannot serve normal requests.
URL
Uniform Resource Location. A web address, referencing a specific location on a network and the mechanism for retrieving it.
zombie
a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction
hacker
a computer expert who uses their technical knowledge to overcome a problem. Typically used to bypass security to gain unauthorized access.
cybercrime
a crime that involves a computer and a network
logic bomb
a set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects.
bitcoins
a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems, and which operates independently of a central bank.
Hacktivism
act of hacking or breaking into a computer system, for politically or socially motivated purposes.
Internet Protocol (IP)
address a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication
click-jacking
also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top level page.
e-crime
crime that involves a computer and a network
computer crime
crime that involves a computer and a network.
malware
designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user
hardware disabler
device designed to ensure a self-destruct sequence of any potential evidence; it may be present on or around a computer, with a remote power switch being the most prevalent of the disabler hardware devices
phishing
illegitimate use of an email message that appears to be from an established organization such as a bank, financial institution, or insurance company.
imaging
in digital forensics, a comprehensive duplicate of electronic media such as a hard-disk (bit-by-bit copy). Used for analysis and preserving evidence and cannot be used as working copies.
Trojan horse
malware which misleads users of its true intent. Appears legitimate, but executes an unwanted activity when activated.
steganography
practice of concealing a file, message, image or video within another file.
sniffing
process of monitoring and capturing all data packets passing through the given network.
keystroke logging
recording of keystrokes on a computer, done with a keylogger which creates a log of all keystrokes.
pharming
redirection of uses to false websites without them knowing it. Done by "poisoning" the local DNS cache with redirected IP address
piracy
software piracy is illegally copying, distributing or use of software that doesn't belong to you in a way that violates the copyright.
adware
software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.
Spyware
software which "spies" on your computer, capturing information such as browsing, email message, usernames and password, credit card info and transmits the date to another computer.
dynamic IP address
the IP address that changes from time to time, typically home networks as it is cheaper than static IP addresses.
Firewall
the network security that acts as a barrier for a network, monitoring incoming and outgoing network traffic, allowing trusted traffic in based on security rules.
data remanence
the residual representation of digital data that remains even after attempts have been made to remove or erase the data.
domain name
the unique name that identifies a website using internet protocol (IP) or network domain so others can access.
Cyberterrorism
the use of the Internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.
encryption
translating data into another form, or code, so only people with access to a secret key (decryption key) or password can read it.
computer virus
type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.
script kiddie (skid)
unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites
spam
unsolicited e-mail, usually sent to dozens or hundreds of different addresses.
skimming
use of a device affixed to an ATM to capture credit and debit card information when customers slip their cards into the machines.
port scanning
using an application designed to probe a server or host for open ports