Cyber Crime and Hacking

Cyber Crime and Hacking

Created by
@HarmlessSanity

Questions and Answers

What is the term for displaying and circulating obscene images?

Cyber pornography

What is the process of reading other user's files and data without their knowledge?

Snooping

What is the term for breaking into someone else's computer system and destroying valuable documents?

Cracking

What is the term for repeatedly sending identical e-mails to a specific e-mail address?

<p>Email bombing</p> Signup and view all the answers

What is the term for sending an email from a false email ID to mislead the recipient?

<p>Email spoofing</p> Signup and view all the answers

What is the term for spreading false messages against a person or a company through e-mail, mobile and social networks?

<p>Cyber defamation</p> Signup and view all the answers

What type of hacker is known for having good intentions?

<p>White Hat Hackers</p> Signup and view all the answers

What is the term used to describe the act of stealing personal information through voice calls and SMS?

<p>Smishing</p> Signup and view all the answers

What is the term used to describe the act of creating fake websites and addresses to deceive users?

<p>Cyber squatting</p> Signup and view all the answers

What is the term used to describe the act of using cyber technologies against the unity, sovereignty, and security of a country?

<p>Cyber terrorism</p> Signup and view all the answers

What is the term used to describe the act of intentionally altering data before or after entering it into a computer?

<p>Data tampering</p> Signup and view all the answers

What is the term used to describe the act of transferring information from one computer to another without permission?

<p>Data theft</p> Signup and view all the answers

Study Notes

Types of Cyber Crimes

  • Cyber crimes can be divided into two categories: targeting computers and computer-weaponized cybercrime
  • Examples of cyber crimes that target computers include hacking, virus attacks, and DOS attacks

Hacking

  • Hacking is the process of finding information on a computer or network by breaking through security systems
  • There are three main types of hackers:
    • White Hat Hackers: hackers with good intentions, also known as Ethical Hackers
    • Black Hat Hackers: hackers with malicious intent, also known as Crackers
    • Gray Hat Hackers: hackers who sometimes have good intentions and sometimes have malicious intentions

Cyber Terrorism

  • Cyber terrorism is the act of using cyber technologies against the unity, sovereignty, and security of a country

Other Cyber Crimes

  • Phishing: the act of stealing highly secure personal information such as passwords and credit card information
  • Smishing: phishing using voice calls and SMS
  • Cyber squatting: the practice of creating fake websites and addresses mistaking them as official or authentic websites
  • Data tampering: the act of intentionally altering data before or after entering it into a computer
  • Data theft: the crime of transferring information from one computer to another computer without permission
  • Cyber pornography: the act of displaying and circulating obscene images
  • Snooping: the process of reading other user's files and data without their knowledge
  • Cracking: the act of breaking into someone else's computer system and destroying valuable and confidential documents and information
  • Cyberstalking: a threat made through the Internet, e-mail, phone call, text message, web camera, website, or video
  • Salami attack: a financial crime committed by computer experts on banks
  • E-mail bombing: the act of repeatedly sending identical e-mails to a specific e-mail address
  • Email spoofing: the process of sending an email from a false email ID to mislead the recipient
  • Email Spamming: the process of sending a group of unwanted e-mails to many people
  • Cyber defamation: the offense of spreading false messages against a person or a company through e-mail, mobile, and social networks
  • Cyber vandalism: the act of stealing a computer or any part of a computer or destroying any information on the computer

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Quizzes Like This

Computer Hacking and Cybercrimes
10 questions
Computer Criminal Categories
18 questions

Computer Criminal Categories

EnergyEfficientApostrophe avatar
EnergyEfficientApostrophe
Cyber Crime Tactics and Techniques
18 questions
Use Quizgecko on...
Browser
Browser