Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Definitions for various terms related to computer science and cybersecurity, including bot herder, botnet, carding, cloning, computer crime, computer ethics, computer fluency, computer forensics, and more. These terms cover a range of topics such as hacking, cyberbullying, cyberstalking, cyberterrorism, and information privacy.
Typology: Quizzes
1 / 11
computer criminal "owning" a botnet TERM 2
DEFINITION 2 collection of zombie computers used for destructive activities or spamming TERM 3
DEFINITION 3 stealing credit card information for one's own use, or to sell TERM 4
DEFINITION 4 using scanners to steal wireless transmitter codes for cell phones, then duplicating the codes for illegal use TERM 5
DEFINITION 5 the use of a computer to commit an illegal act
a broad range of issues and standards of conduct that have emerged through the use and proliferation of information systems TERM 7
DEFINITION 7 the ability to independently learn new technologies as they emerge and assess their impact on one's work and life TERM 8
DEFINITION 8 the use of formal investigative techniques to evaluate digital information for judicial review TERM 9
DEFINITION 9 the knowledge of how to operate a computer TERM 10
DEFINITION 10 a form of intellectual property, referring to creations of the mind such as music, literature, or software
an individual who breaks into computer systems with the intention of doing damage or committing a crime TERM 12
DEFINITION 12 the use of a computer to intentionally cause emotional distress to a person TERM 13
DEFINITION 13 the use of a computer to communicate obscene, vulgar, or threatening content that causes a reasonable person to endure distress TERM 14
DEFINITION 14 the use of a computer to repeatedly engage in threatening or harassing behavior TERM 15
DEFINITION 15 the dubious practice of registering a domain name, then trying to sell the name to the person, company, or organization most likely to want it
the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals TERM 17
DEFINITION 17 an organized attempt by a country's military to disrupt or destroy information and communications systems of another country TERM 18
DEFINITION 18 a type of computer crime where the data going into or out of a computer is altered TERM 19
DEFINITION 19 the gap between those individuals in our society who are computer literate and have access to information resources like the Internet and those who do not TERM 20
DEFINITION 20 going through dumpsters and garbage cans for company documents, credit card receipts, and other papers containing information that might be useful for committing computer crimes
individual who gains unauthorized access to computer systems TERM 22
DEFINITION 22 cybercriminal pursuing political, religious, or ideological goals TERM 23
DEFINITION 23 stealing another person's Social Security number, credit card number, and other personal information for the purpose of using the victim's credit rating to borrow money, buy merchandise, and run debts that are never repaid TERM 24
DEFINITION 24 an ethical issue that focuses on defining what information a person or organization has the right to obtain about others and how this information can be access and used TERM 25
DEFINITION 25 an ethical issue concerned with the authenticity and fidelity of information, as well as identifying who is responsible for informational errors that harm people
a period of time in society when information became a valuable or dominant currency TERM 27
DEFINITION 27 an ethical issue that is concerned with what information an individual should have to reveal to others through the course of employment or through other transactions such as online shopping TERM 28
DEFINITION 28 an ethical issue that focuses on who owns information about individuals and how information can be transferred, sold, and exchanged TERM 29
DEFINITION 29 intellectual property: creations of the mind that have commercial value TERM 30
DEFINITION 30 a false message circulated online about any topic of public interest, typically asking the recipient to perform a certain action
a type of computer virus that lies in wait for unsuspecting computer usersto perform a triggering operation before executing its instructions TERM 32
DEFINITION 32 people feeling threatened by and protesting against or destroying technology TERM 33
DEFINITION 33 malicious software such as viruses, worms, or Trojan horses TERM 34
DEFINITION 34 misrepresenting oneself in order to steal equipment or to trick others into revealing sensitive information (aka social engineering) TERM 35
DEFINITION 35 One Laptop Per Child: an initiative to distribute very low- cost laptop computers to children in developing countries around the world
cyber criminal using the Internet to target vulnerable people, usually the young or old, for sexual or financial purposes TERM 37
DEFINITION 37 type of intellectual property typically referring to process, machine, or material inventions TERM 38
DEFINITION 38 Independent citizens or supporters of a country that perpetrate computer attacks on perceived or real enemies TERM 39
DEFINITION 39 crimes committed against telephone company computers with the goal of making free long distance calls, impersonating directory assistance or other operator services, diverting calls to numbers of the perpetrator's choice, or otherwise disrupting telephone service for subscribers TERM 40
DEFINITION 40 looking over a person's shoulder while they're using an ATM, cell phone, or other device in order to steal access information;aka shoulder-surfing
a form of data diddling that occurs when a person shaves small amounts from financial accounts and deposits them in a personal account TERM 42
DEFINITION 42 looking over a person's shoulder while they're using an ATM, cell phone, or other device in order to steal access information TERM 43
DEFINITION 43 misrepresenting oneself in order to steal equipment or to trick others into revealing sensitive information; aka masquerading TERM 44
DEFINITION 44 a type of computer crime where individuals make illegal copies of software protected by copyright laws TERM 45
DEFINITION 45 attempts to trick financial account and credit card holders into giving away their authorization information, usually by sending spam messages to millions of email accounts;aka phishing
a type of computer virus that lies in wait for a specific date before executing its instructions TERM 47
DEFINITION 47 destructive computer code whose instructions remain hidden to the user because the computer appears to function normally but, in fact, is performing underlying functions dictated by the intrusive code TERM 48
DEFINITION 48 phone scams that attempt to defraud people by asking the to call a bogus telephone number to "confirm" their account information; aka voice fishing TERM 49
DEFINITION 49 slang term for stolen proprietary software that is sold or shared for free over the Internet TERM 50
DEFINITION 50 a digital or physical mark that is difficult to reproduce; used to prevent counterfeiting
the act of defacing Web sites