Add to Chrome
✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
Match the definitions with the terms.
Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
The use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
The politically motivated use of computers and information technology to cause severe disruption or widespread fear in society.
A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.
The use of computer networks to gain illicit access to confidential information, typically that held by a government or other organization.
The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
A person who commits fraud, especially in business or commercial dealings.
The fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.
The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
A type of malicious software designed to block access to a computer system until a sum of money is paid.
The practice of obtaining something, especially money, through force or threats.
The practice of connecting a listening device to a telephone line to monitor conversations secretly.
A computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
A feature or defect of a computer system that allows surreptitious unauthorized access to data.
Irrelevant or unsolicited messages sent over the internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.; unwanted or intrusive advertising on the Internet.
The fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc.
A video, image, etc. in which a person’s face, body, or voice has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!