null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
20670018
Cybercrime
Descripción
Year 8 Computing Mapa Mental sobre Cybercrime, creado por Nyah Smith el 29/01/2020.
Sin etiquetas
computing
computing
year 8
Mapa Mental por
Nyah Smith
, actualizado hace más de 1 año
Más
Menos
Creado por
Nyah Smith
hace más de 4 años
22
0
0
Resumen del Recurso
Cybercrime
Crimes committed utilizing computers, or the internet.
Nota:
any criminal activity carried out using the internet or computers.
identity theft
using stolen data, they pretend to be you, often spending money.
transaction fraud
Nota:
Quicker transaction times increase the chances of fraudulent transactions going undetected
stolen data is used to generate unauthorized transactions
advance fee fraud
scams, in which an individual, or "businesses" offer something, but ask for money prior to the deal. In the end, they never pay.
hacking
gaining access to someone else's systems/data
piracy
usage of another persons work (copying) without permission
data theft
an example is when someone is leaving their job, they copy data from the old one and use it in their new one.
Nota:
Copying data from elsewhere and using it as your own.
ransomware
using malware, they steal data and put a ransom on it for you to buy it back off them
phishing
often sending fake emails, to get personal details out of people.
look out for
greeting
address
forged link
request for personal info
sense of urgency
poor grammar/ spelling
the message often has something convincing about winning money or banks.
emails start with 'dear customer' or 'client' rather than your name
a padlock or the 's' on 'https' are signs of if the links are safe
a legitimate email will have a link with an 's' or secured padlock
Cyber security
Nota:
(information technology security)
protects computer's network from theft or damage
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
A level Computing Quiz
Zacchaeus Snape
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
Computing Hardware - CPU and Memory
ollietablet123
Computer Systems
lisawinkler10
Computer science quiz
Ryan Barton
Input, output and storage devices
Mr A Esch
Explorar la Librería