• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

Typo-Squatting

Registers domain name with similar to real domain names but with typo in hopes of reaching page by accident.

Cyber-Squatting

Registers domain name in bad faith, violating the rights of trade mark owner

Page Jacking

When offender copies part of existing website spam



Phishing

A scam where official looking email is sent to a unsuspecting user to try to trick them out of login information such as username and password.

Vishing

email or phone call to gain information

Key-Stroke Phishing

Trojan horse program when source tracks the keystrokes and sends back to scammer in hopes of gaining login/ password information

Identity Theft

Person gathers subjects information and then poses as subjects when purchasing goods.

Cookie Poisoning

modification of cookies that are put on your computer by an attacker to gain specific information.

Spyware

Software that downloads onto computer without owners' knowledge and scans for malicious purposes.

Malware

developed to do harm. Examples include viruses, worms, etc.

Worms

self replicating virus that settles in memory.

Pod Slurping

Steals data off of an Ipod

Cyber Stalking

Crime when the attacker harasses the victim using electronic email, IM, Chat, etc.

COPA

Child Online Protection Act makes it a crime to publish any sexual communication materials to minors without restrictive access.

Securities Fraud

Persons that attempt to manipulate online pricing. Maybe will sell for allegedly cheaper price.

Defamation

Any published intentional false communication that negatively injures a person or company.

USA Patriot Act

Approved in 2001, allows all electronic messages to be intercepted if believed to be criminal or terrorist activity.

Spam

Irrelevant or inappropriate messages sent to a mass of recipients for solicitation.

Trademark

Word, Name, Symbol, or combination belonging to a particular product for identification.

Fair Use Act

Allows limited use of a copyrighted work. Examples included are teaching criticisms, comments, news reporting research, etc.