Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cybercrime Project (Vocab (Phishing Scam (An attack that typically uses…
Cybercrime Project
Vocab
Phishing Scam
An attack that typically uses disguised emails as a weapon and trick the email recipient into believing that the message is something they want or need.This is connected to DDos Attack and Virus as criminal activity.
Firewall
A computer security system that controls the outflow of data to other computers and inflow of data from outside computers blocking any malware from entering the server. This is connected to SSL/TLS and Antivirus Software for keeping data safe.
SSL/TLS
An encrypted layer that allows for transmitting private data securely over the internet. The encrypted link between the web server and the browser. This is connected to Firewall and Antivirus Software for keeping data safe.
DDos Attack
When multiple compromised systems target a single website or server, that causes the blocking of legitimate users of the targeted website or server. This is connected to Phishing scam and Virus as criminal activity.
Virus
A program of code that is designed to perform malicious attacks on computer servers and other technology with out the owners knowledge. This is connected to DDos Attack and Virus as criminal activity.
AntiVirus Software
A program designed to protect computers from all types of malware(viruses, spyware, etc.) This is connected to Firewall and SSL/TLS for keeping data safe.
-
Phishing Scam
On December 2, 2019, The Bank of East Asia put out a public statement that tells their customers that there was a fraudulent website connected to their bank that asked for personal information from customers. This is an example of using a phishing scam for identity theft. https://www.info.gov.hk/gia/general/201912/02/P2019120200635.htm
DDos Attack
The PopVote DDoS attack was carried out in 2014 and targeted the Hong Kong-based grassroots movement known as Occupy Central. The movement was campaigning for a more democratic voting system. The attack barraged servers with packets disguised as legitimate traffic, and was executed with not one, not two, but five botnets. This resulted in peak traffic levels of 500 gigabits per second. https://www.a10networks.com/blog/5-most-famous-ddos-attacks/
-