Term
|
Definition
| the intent to destroy or harm a system or some of its components |
|
|
Term
|
Definition
| typically business people who commit fraud |
|
|
Term
| missappropriation of assets or employee fraud |
|
Definition
|
|
Term
| fraudulent financial reporting |
|
Definition
| intentional or reckless conduct that results in materially misleading financial statements |
|
|
Term
|
Definition
Opportunity, Rationalization, Pressure
opportunity - commit, convert, conceal |
|
|
Term
|
Definition
| a person's incentive or motivation for committing fraud |
|
|
Term
|
Definition
| any illegal act for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution |
|
|
Term
|
Definition
| clicking on ads numerous times to inflate advertising bills |
|
|
Term
|
Definition
| sending email bombs from randomly generated false addresses, the recipient's internet service provider email server is overloaded and shuts down |
|
|
Term
|
Definition
| wireless network with the same name as a local wireless access point |
|
|
Term
|
Definition
| accessing and using computer systems without permission, usually by means of a personal computer and telecommunications network |
|
|
Term
|
Definition
| gaining control of someone else's computer to carry out illicit activities without the owner's knowledge |
|
|
Term
|
Definition
| assuming someone's identity, usually for economic gain, by illegally obtaining confidential information |
|
|
Term
|
Definition
| using spyware to record a user's keystrokes |
|
|
Term
|
Definition
| software that can be used to do harm |
|
|
Term
|
Definition
| using a computer to find confidential information as it travels the internet and other networks |
|
|
Term
|
Definition
| penetrating system defenses, stealing passwords and decrypting them so they can be used to access system programs, files, and data |
|
|
Term
|
Definition
| redirecting traffic to a spoofed web site to gain access to personal and confidential information |
|
|
Term
|
Definition
| sending emails requesting recipients to visit a web page to verify or fill in missing data. |
|
|
Term
|
Definition
1. using someone's wi-fi network for mischief, hacking, etc, 2. tapping into a telecommunications line , latching onto an authorized user and accompanying them into the system 3. bypassing physical security by entering when an authorized person enters |
|
|
Term
|
Definition
| pretending to be a legitimate business, collecting money and info and never delivering a product |
|
|
Term
| scavenging/dumpster diving |
|
Definition
| looking for personal information in the trash or on old hard drives |
|
|
Term
|
Definition
| listening to someone as they give out confidential information to another |
|
|
Term
|
Definition
| double-swiping credit cards or swiping a card into a card reader to record the data for later use |
|
|
Term
|
Definition
| emailing an unsolicited message to many people at the same time |
|
|
Term
|
Definition
| using software to monitor computing habits and send the data to someone else without the computer user's permission |
|
|
Term
|
Definition
| entering a system using a back door that bypasses normal system controls |
|
|
Term
|
Definition
| unauthorized code or virus hiding inside and authorized program |
|
|
Term
|
Definition
| a segment of code that attaches itself to software, replicates and spreads to other systems or files |
|
|
Term
|
Definition
| voice phishing where email recipients are asked to call a phone number where they then divulge personal information |
|
|
Term
|
Definition
| dialing thousands of phone lines searching for idle modems that can be used to enter a system |
|
|
Term
|
Definition
| looking for unprotected wireless networks using a car or rocket |
|
|
Term
|
Definition
| program hidden in a host program, copies and actively transmits itself to other systems |
|
|
Term
|
Definition
| an attack between the time a new software vulnerability is discovered and a software patch that fixes the problem is released |
|
|