TEKNIK PENIPUAN DAN PENYALAHGUNAAN
KOMPUTER
SERANGAN DAN PENYALAHGUNAAN KOMPUTER
REKAYASA SOSIAL
MALWARE
Packet Sniffer
Rootkit
Bom waktu dan Bom Logika
Superzapping
Trojan Horse
Virus
Keylogger
Worm
Ransomeware
Bluebugging
Scareware
Perangkat Lunak Torpedo
Adware
Program Steganografi
Spyware
Pharming
Evil Twin
Carding
Typosquating
Phising
Tabnapping
Phosing
Scavenging
Pencurian identitas
Skimming
Chipping
Menguping
Serangan Man-in-the-middle
Teknik Salami
Cross site scripting
Spionase Ekonomi
Serangan zero Day
Cyber Bulliying
Serangan injeksi SQL
Sexting
Spoofing
Penipuan lelang Internet
Spamming
Penjelajahan situs
Hacking
Terorisme Internet
Cross site scripting