Term
|
Definition
An array of criminal activity including offenses against computer data and systems |
|
|
Term
Describe various types of computer based crime |
|
Definition
- Credit card fraud - Identity theft - Cyber terrorism - Illegal internet gambling - Patent and Copyright Vioaltions |
|
|
Term
How can computers be used as tools to commit crimes? |
|
Definition
A computer can be used as a tool to gain access to valuable information and as the means to steal thousands or millions of dollars by criminals have knowledge on how to to gain access and manipulate other computers |
|
|
Term
How can computers be objects or targets of crime? |
|
Definition
Personal and business computers can be accessed by an attacker who gains illegal access to your computer |
|
|
Term
|
Definition
Going through someones rubbish trying to find important pieces of information |
|
|
Term
What is Social engineering |
|
Definition
The attacked talking a password out of someone |
|
|
Term
|
Definition
Deceiving a user into thinking their on a trustworthy source and getting them to give a password of credit card details |
|
|
Term
|
Definition
An individual who enjoys technology and spends much time learning about and using computers. |
|
|
Term
|
Definition
Short for criminal hacker who gain unauthorized access to computer systems. |
|
|
Term
Define Script Bunny or Script Kiddies |
|
Definition
Individuals with little technical knowledge who download programs, called scripts, that automate breaking into computers |
|
|
Term
|
Definition
A program that attaches itself to other programs |
|
|
Term
|
Definition
An independent program, that replicates itself, interrupting the functioning of networks and computers |
|
|
Term
|
Definition
A system or application viruses designed to execute at a specific event, time, or date |
|
|
Term
|
Definition
A program that appears to be useful but hides a virus or worm. |
|
|
Term
|
Definition
A set of programs that enable its user to gain administrator level access to a computer or network. |
|
|
Term
|
Definition
A generic term for any software installed on a personal computer to intercept or take partial control over the user's interaction with the computer without the knowledge or permission of the user. |
|
|
Term
What are the 3 safeguards companies take to prevent cyber crime? |
|
Definition
- Senior management involvement - Safeguards: passwords, antivirus, backups etc - Planned Response - plan incase security is breeched |
|
|
Term
|
Definition
Principles and standards that guide behaviour towards other people |
|
|
Term
|
Definition
|
|