Term
|
Definition
| An array of criminal activity including offenses against computer data and systems |
|
|
Term
| Describe various types of computer based crime |
|
Definition
- Credit card fraud - Identity theft - Cyber terrorism - Illegal internet gambling - Patent and Copyright Vioaltions |
|
|
Term
| How can computers be used as tools to commit crimes? |
|
Definition
| A computer can be used as a tool to gain access to valuable information and as the means to steal thousands or millions of dollars by criminals have knowledge on how to to gain access and manipulate other computers |
|
|
Term
| How can computers be objects or targets of crime? |
|
Definition
| Personal and business computers can be accessed by an attacker who gains illegal access to your computer |
|
|
Term
|
Definition
| Going through someones rubbish trying to find important pieces of information |
|
|
Term
| What is Social engineering |
|
Definition
| The attacked talking a password out of someone |
|
|
Term
|
Definition
| Deceiving a user into thinking their on a trustworthy source and getting them to give a password of credit card details |
|
|
Term
|
Definition
| An individual who enjoys technology and spends much time learning about and using computers. |
|
|
Term
|
Definition
| Short for criminal hacker who gain unauthorized access to computer systems. |
|
|
Term
| Define Script Bunny or Script Kiddies |
|
Definition
| Individuals with little technical knowledge who download programs, called scripts, that automate breaking into computers |
|
|
Term
|
Definition
| A program that attaches itself to other programs |
|
|
Term
|
Definition
| An independent program, that replicates itself, interrupting the functioning of networks and computers |
|
|
Term
|
Definition
| A system or application viruses designed to execute at a specific event, time, or date |
|
|
Term
|
Definition
| A program that appears to be useful but hides a virus or worm. |
|
|
Term
|
Definition
| A set of programs that enable its user to gain administrator level access to a computer or network. |
|
|
Term
|
Definition
| A generic term for any software installed on a personal computer to intercept or take partial control over the user's interaction with the computer without the knowledge or permission of the user. |
|
|
Term
| What are the 3 safeguards companies take to prevent cyber crime? |
|
Definition
- Senior management involvement - Safeguards: passwords, antivirus, backups etc - Planned Response - plan incase security is breeched |
|
|
Term
|
Definition
| Principles and standards that guide behaviour towards other people |
|
|
Term
|
Definition
|
|