Podcast
Questions and Answers
What is the term used to describe a situation where the receiver of a message is fooled into believing it is from a trusted source, but it is actually not?
What is the term used to describe a situation where the receiver of a message is fooled into believing it is from a trusted source, but it is actually not?
Spoofing
What is it called when an attacker harasses a victim through emails, social media, chat rooms, blogs, and instant messaging?
What is it called when an attacker harasses a victim through emails, social media, chat rooms, blogs, and instant messaging?
Cyberstalking
Describe what cyberbullying involves.
Describe what cyberbullying involves.
Harming or harassing through information technology in a deliberate manner, including insulting remarks, spreading rumors, posting embarrassing content, and making derogatory remarks.
How can cyberstalking harm a victim?
How can cyberstalking harm a victim?
Signup and view all the answers
What kind of offences fall under Cybercrimes Against an Individual Person?
What kind of offences fall under Cybercrimes Against an Individual Person?
Signup and view all the answers
What happens when a user clicks on a link provided by a sender during e-mail spoofing?
What happens when a user clicks on a link provided by a sender during e-mail spoofing?
Signup and view all the answers
Who can be a stalker in cyberstalking cases?
Who can be a stalker in cyberstalking cases?
Signup and view all the answers
What is the primary goal of cyberstalking?
What is the primary goal of cyberstalking?
Signup and view all the answers