Pages

May 15, 2018

Cybercrime

Interlinked Thematic Vocabulary Unit NÂș 0295 v.2
.

      Main Definitions

  1. cybercrime / crime computer |n| a criminal activity that involves a computer, networked device or a network. While most cybercrimes are carried out in order to generate profit for the cybercriminals, some cybercrimes are carried out against computers or devices directly to damage or disable them, while others use computers or networks to spread malware, illegal information, images or other materials. Some cybercrimes do both -- i.e., target computers to infect them with viruses, which are then spread to other machines and, sometimes, entire networks.


       Classification

  1. baiting |n| is when an attacker leaves a malware-infected physical device, such as a USB flash drive in a place it is sure to be found. The finder then picks up the device and loads it onto his or her computer, unintentionally installing the malware.
  2. camfecting |n| a process of attempting to hack into a person's webcam and activate it without the webcam owner's permission.
  3. cyberbullying / cyberharassment |n| a form of bullying or harassment using electronic means. Cyberbullying and Cyberharassment are also known as online 
  4. cyberextortion |n| a crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
  5. cybersquatting |n| the practice of registering names, especially well-known company or brand names, as Internet domains, in the hope of reselling them at a profit.
  6. cyberstalking |n| a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group. Cyberstalking messages differ from ordinary spam in that a cyberstalker targets a specific victim with often threatening messages, while the spammer targets a multitude of recipients with simply annoying messages.
  7. cyberterrorism |n| a premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents."
  8. grooming / internet grooming / online grooming / child grooming |n| child grooming is befriending and establishing an emotional connection with a child, and sometimes the family, to lower the child's inhibitions with the objective of sexual abuse. Child grooming is also regularly used to lure minors into various illicit businesses such as child trafficking, child prostitution, or the production of child pornography.
  9. pretexting |n| is when one party lies to another to gain access to privileged data. For example, a pretexting scam could involve an attacker who pretends to need personal or financial data in orScareware: Scareware involves tricking the victim into thinking his computer is infected with malware or has inadvertently downloaded illegal content. The attacker then offers the victim a solution that will fix the bogus problem; in reality, the victim is simply tricked into downloading and installing the attacker's malware.der to confirm the identity of the recipient.
  10. scareware |n| involves tricking the victim into thinking his computer is infected with malware or has inadvertently downloaded illegal content. The attacker then offers the victim a solution that will fix the bogus problem; in reality, the victim is simply tricked into downloading and installing the attacker's malware.
  11. social engineering |n| an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
  12. phishing |n| a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels. The attacker uses phishing emails to distribute malicious links or attachments that can perform a variety of functions, including the extraction of login credentials or account information from victims.
  13. "Phishing is becoming very popular with computer criminals."
  14. spear phishing |n| is like phishing, but tailored for a specific individual or organization.
  15. typosquatting |n| a form of Internet cybersquatting, based on the probability that a certain number of Internet users will mistype the name of a Web site (or actually its URL) when surfing the Web. Typically, a typosquatter will register several possible input errors for a "brand name" Web site known for its high traffic, and then monitor to see how many clicks a day each of their "typo" domain names receives, and use the information to sell advertising for the sites that receive a high volume of accidental traffic. Advertising revenue might come from selling ads to the original site's competitors or by providing redirect pages to related products or services.
  16. vishing / voice phishing |n| IP telephony’s version of phishing and uses voice messages to steal identities and financial resources.


      People

  1. cyberstalker |n| someone who relies upon the anonymity afforded by the Internet to allow them to stalk their victim without being detected.
  2. cyberterrorist |n| a criminal who uses computer technology and the Internet, especially to cause fear and disruption. Some cyber-terrorists spread computer viruses, and others threaten people electronically.
  3. social engineer |n| someone who runs what used to be called a "con game." Techniques such as appeal to vanity, appeal to authority and appeal to greed are often used in social engineering attacks. Many social engineering exploits simply rely on people's willingness to be helpful. For example, the attacker might pretend to be a co-worker who has some kind of urgent problem that requires access to additional network resources. 
  4. spammer |n| a person who gets free non-stop advertisement across the globe in millions of peoples electronic mail boxes.
  5. visher |n| a vishing perpetrator.


      Related Posts

No comments:

Post a Comment