lesson 6

Cards (29)

  • Cybercrime
    The use of a computer as an instrument to further illegal ends
  • Cybercriminal
    A person who uses their skills in technology to do malicious acts and illegal activities known as cybercrimes
  • Types of cybercrimes
    • Individual cyber crimes
    • Organisation cyber crimes
    • Property cybercrimes
    • Society cybercrimes
  • Individual cyber crimes
    Targeting individuals, includes phishing, spoofing, spam, cyberstalking, and more
  • Organisation cyber crimes
    The main target is organizations, usually done by teams of criminals including malware attacks and denial of service attacks
  • Property cybercrimes
    Targeting property like credit cards or even intellectual property rights
  • Society cybercrimes
    The most dangerous form, includes cyber-terrorism
  • Phishing
    A type of social engineering attack that targets the user and tricks them by sending fake messages and emails to get sensitive information
  • Identity theft
    When a cybercriminal uses another person's personal data like credit card numbers or personal pictures without their permission to commit a fraud or a crime
  • Ransomware attack
    A type of malware that prevents users from accessing their personal data by encrypting it and demanding a ransom to decrypt it
  • Hacking/Misusing computer networks
    Unauthorized access to private computers or networks and misuse of it either by shutting it down or tampering with the data
  • Cyber bullying
    Sending or sharing harmful and humiliating content about someone else online
  • Cyber stalking
    Unwanted persistent content from someone targeting other individuals online with the aim of controlling and intimidating
  • Software piracy
    The illegal use or copy of paid software with violation of copyrights or license restrictions
  • Social media frauds
    The use of social media fake accounts to perform any kind of harmful activities like impersonating other users or sending intimidating or threatening messages
  • Online drug trafficking
    The use of cryptocurrency technology to transfer money in a secured private way and complete drug deals without drawing the attention of law enforcement
  • Electronic money laundering
    Also known as transaction laundering, it is based on unknown companies or online business that makes approvable payment methods and credit card transactions but with incomplete or inconsistent payment information for buying unknown products
  • Cyber extortion
    The demand for money by cybercriminals to give back some important data they've stolen or stop doing malicious activities such as denial of service attacks
  • Intellectual-property infringements
    The violation or breach of any protected intellectual-property rights such as copyrights and industrial design
  • Online recruitment fraud
    Fake job opportunities released by fake companies for the purpose of obtaining a financial benefit from applicants or even making use of their personal data
  • Illegal access
    Unauthorized access (without right) to a computer system or application
  • Illegal interception
    Unauthorized interception of any non-public transmission of computer data to, from, or within a computer system
  • Data interference
    Unauthorized alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, and including the introduction or transmission of viruses
  • System interference
    Unauthorized hindering or interference with the functioning of a computer
  • Misuse of devices
    The unauthorized use, possession, production, sale, procurement, importation
  • Cyber-squatting
    Acquisition of domain name over the Internet in bad faith to profit, mislead, destroy reputation, and deprive others from the registering the same
  • Computer-related forgery
    Unauthorized input, alteration, or deletion of computer data resulting to inauthentic data with the intent that it be considered
  • Computer-related fraud
    Unauthorized input, alteration, or deletion of computer data or program
  • Cybersex
    Willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration