TEKNIK PENIPUAN DAN PENYALAHGUNAAN
KOMPUTER

SERANGAN DAN PENYALAHGUNAAN KOMPUTER

REKAYASA SOSIAL

MALWARE

Packet Sniffer

Rootkit

Bom waktu dan Bom Logika

Superzapping

Trojan Horse

Virus

Keylogger

Worm

Ransomeware

Bluebugging

Scareware

Perangkat Lunak Torpedo

Adware

Program Steganografi

Spyware

Pharming

Evil Twin

Carding

Typosquating

Phising

Tabnapping

Phosing

Scavenging

Pencurian identitas

Skimming

Chipping

Menguping

Serangan Man-in-the-middle

Teknik Salami

Cross site scripting

Spionase Ekonomi

Serangan zero Day

Cyber Bulliying

Serangan injeksi SQL

Sexting

Spoofing

Penipuan lelang Internet

Spamming

Penjelajahan situs

Hacking

Terorisme Internet

Cross site scripting