Podcast
Questions and Answers
What is the term used to describe a situation where the receiver of a message is fooled into believing it is from a trusted source, but it is actually not?
What is the term used to describe a situation where the receiver of a message is fooled into believing it is from a trusted source, but it is actually not?
Spoofing
What is it called when an attacker harasses a victim through emails, social media, chat rooms, blogs, and instant messaging?
What is it called when an attacker harasses a victim through emails, social media, chat rooms, blogs, and instant messaging?
Cyberstalking
Describe what cyberbullying involves.
Describe what cyberbullying involves.
Harming or harassing through information technology in a deliberate manner, including insulting remarks, spreading rumors, posting embarrassing content, and making derogatory remarks.
How can cyberstalking harm a victim?
How can cyberstalking harm a victim?
What kind of offences fall under Cybercrimes Against an Individual Person?
What kind of offences fall under Cybercrimes Against an Individual Person?
What happens when a user clicks on a link provided by a sender during e-mail spoofing?
What happens when a user clicks on a link provided by a sender during e-mail spoofing?
Who can be a stalker in cyberstalking cases?
Who can be a stalker in cyberstalking cases?
What is the primary goal of cyberstalking?
What is the primary goal of cyberstalking?
Flashcards are hidden until you start studying