EMTECH

Cards (17)

  • Cybercrime is any criminal activity that involves a computer, networked device, or network.
  • Cyberbullying is the use of technology to harass, threaten, or intimidate someone, usually a child or teenager.
  • Common Cybercrimes are the following; Malware, Hacking, Spamming, Phishing, Pharming, Identity Theft, Piracy, Online Grooming, and Cyberbullying.
  • Pharming is a cyber attack in which an attacker redirects a website's traffic to a fake version of the site in order to steal personal information, such as login credentials, financial information or personal details.
  • Malware is short for "malicious software", refers to any intrusive software developed by cybercriminals often called "hackers" to steal fata and damage or destroy computers and computer systems.
  • Kinds of Malware: Virus, Worm, Trojan, Spyware, Adware
  • Virus is a type of malware that spreads between computers and causes damage to data and software.
  • Worm is a malware program that transfers from one computer to another by any type of means. It uses computer network to spread itself.
  • Trojan is a type of malware that disguises itself as legitimate software in order to gain access to a computer system.
  • Spyware is a type of software that is designed to gather information about a user or organization without their knowledge or consent.
  • Adware is a software that displays advertisements on a computer or mobile device, typically in the form of pop-up ads or banners.
  • Spam is a unwanted or unsolicited electronic messages, typically sent in bulk to a large number of recipients through email, instant messaging, or other forms of online communication.
  • Online Grooming in an act of building an emotional connection with a child or teenager through the internet in order to exploit them sexually.
  • Piracy is an unauthorized copying or distribution of copyrighted material, such as music, movies, or software.
  • Identity Theft is an unauthorized use of an individual's personal information, such as name, social security number, or credit card information, for fraudulent activities.
  • Phishing a tactic used by cybercriminals to trick individuals into giving sensitive information, such as login credentials or financial information, by disguising themselves as a trustworthy entity through email, text message, or social media.
  • Hacking is the act of gaining unauthorized access to a computer system, network, or website in order to steal or destroy data, disrupt service, or gain control of the system.