Please enable JavaScript.
Coggle requires JavaScript to display documents.
Computer Fraud (computer attack and abuse (hacking (unauthorized access,…
Computer Fraud
computer attack and abuse
hacking
unauthorized access, modification or use of an electronic device or some element of a computer system
hijacking
gaining control of someone else's computer to carry out illicit activitie, such as sending spam without the computer user's knowledge
botnet
a network of powerful and dangerous hijacked computer that are used to attack system or spread malware
denial of service attack
a compuer attack in which the attacker in which the attacker sends so many email bombs or webpage request, often from randomly generated false addresses that the internet service provider's e-mail server or the web server is overloaded and shuts down
spamming
simultaneously sending the same unsolicited message to many people, often to sell something
salami technique
stealing tiny amount from an account from different account
password cracking
penetrates a system defense, steal the file containing valid password,decrypt them and use them to gain access for data
data leakage
unauthorized copying of company data, often leave no traced behind
economic espionage
theft of information, trade secrets and intellectual property
software piracy
the unauthorized copying or distribution of copyrighted software
spoofing
altering some part of an electronic communication to make it look as if someone else sent the communication in order to gain the trust of the recepient
social engineering
psychological trick to ensure people follow the perpetrators instruction
identity theft
steal others identity for economic gain by illegally obtain confidential information such as identity card
pretexting
using an invented scenario that creates legitimacy in target's mind in order to increase likelihood the victim to disclose the information
posing
creating a seemingly legitimate business , collecting information in making the sale, and never delivering the product
phishing
send an electronic message pretending to be legitimate company requesting information and often to threaten the victim if not provided
URL hijacjing
setting up similar website so that when user making typographical error when entering the website names, user will sent to invalid site
Lebanese looping
inserting a sleeve into a ATM that prevent it from rejecting the card. the perpetrators pretend to help the victim, tricking the person to enter the pin again. once victim gives up, the thief removes the card and withdraw the money
malware
any software that is used to do harm.
spyware
software that secretly monitor computer usage, collect personal information and send it to someone else without computer's user permission
adware
spyware that causes banner ads to pop up on a monitor, collect information about the user's web-surfing and spending habit, and forward it to the adware creator, often an advertising or media organization
scareware
malicious software that sold by using scare tactics
trojan horse
a set of unauthorized computer instruction in an authorized and otherwise properly functioning program
keyloggers
software that records computer activity, such as a keystrokes, e-mails sent and received, websites visited and chat participation
virus
a segment of executable code that attaches itself to a file, program or some other executable system component. when the hidden program is triggered, it makes unauthorized alterations to the way a system operates
worm
similar to virus, except that it is program rather than a code segment hidden in a host program. a worm also copy itself automatically and actively transmit itself directly to other system