Add to Chrome
✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
Match the definitions with the terms.
The use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
The practice of connecting a listening device to a telephone line to monitor conversations secretly.
A person who commits fraud, especially in business or commercial dealings.
The politically motivated use of computers and information technology to cause severe disruption or widespread fear in society.
A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.
A feature or defect of a computer system that allows surreptitious unauthorized access to data.
Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
The fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc.
The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
A computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
The practice of obtaining something, especially money, through force or threats.
A type of malicious software designed to block access to a computer system until a sum of money is paid.
The fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.
A video, image, etc. in which a person’s face, body, or voice has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
Irrelevant or unsolicited messages sent over the internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.; unwanted or intrusive advertising on the Internet.
The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
The use of computer networks to gain illicit access to confidential information, typically that held by a government or other organization.
Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!