vocabulary cassandra peoples. pharming the practice of redirecting computer users from legitimate...

Post on 20-Jan-2018

216 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Cyber Stalking Cyber-Stalking is defined as the unlawful act of collecting or amassing an individual’s private information with regards to the internet, a computer, or alternative electronic network. This can include the illegal trespass onto a computer terminal or network belonging to the victim. Furthermore, Cyber-Stalking can be enacted in order to illicitly spy or watch another individual in which the intent is considered to be inherently criminal and unlawful in nature.

TRANSCRIPT

Vocabulary

Cassandra Peoples

Pharming• the practice of redirecting

computer users from legitimate websites to fraudulent ones for the purposes of extracting confidential data

Cyber Stalking• Cyber-Stalking is defined as the unlawful act

of collecting or amassing an individual’s private information with regards to the internet, a computer, or alternative electronic network. This can include the illegal trespass onto a computer terminal or network belonging to the victim. Furthermore, Cyber-Stalking can be enacted in order to illicitly spy or watch another individual in which the intent is considered to be inherently criminal and unlawful in nature. 

Spy Wareinstalled unknowingly, that gathers

information about an Internet user's browsing habits or intercepts personal data, transmitting this information to a third party for commercial gain.

Phishing• To try to obtain financial or other confidential

information from Internet users, typically by sending an e-mail that looks as if it is from a legitimate organization, usually a financial institution, but contains a link to a fake Web site that replicates the real one.

HackingHacking• Getting in to someone’s personal settings

.

Virus• (By analogy with biological viruses, via science fiction) A

program or piece of code, a type of malaria, written by a cracker, that "infects" one or more other programs by embedding a copy of itself in them, so that they become Trojan horses. When these programs are executed, the embedded virus is executed too, thus propagating the

"infection". This normally happens invisibly to the user.

MalwareMalware• software intended to damage a computer, software intended to damage a computer,

computer system, or computer network, or to computer system, or computer network, or to take   partial control over its operation: take   partial control over its operation: tips on tips on finding and removing viruses, spyware, and finding and removing viruses, spyware, and other malware.other malware.

GeotagsGeotags• Its a gps location attach to a

file.

Child PornographyChild Pornography • When someone is takeng pictures children . And posting them.

SpamSpam• To post irrelevant or inappropriate messages

to one or more Usenet newsgroups, mailing lists, or other messaging system in deliberate or accidental violation of netiquette.

Back up•a file or set of files copied for security purposes

top related