Cybercrime

Description

Year 8 Computing Mind Map on Cybercrime, created by Nyah Smith on 29/01/2020.
Nyah Smith
Mind Map by Nyah Smith, updated more than 1 year ago
Nyah Smith
Created by Nyah Smith almost 5 years ago
25
0

Resource summary

Cybercrime
  1. Crimes committed utilizing computers, or the internet.

    Annotations:

    • any criminal activity carried out using the internet or computers.
    1. identity theft
      1. using stolen data, they pretend to be you, often spending money.
      2. transaction fraud

        Annotations:

        • Quicker transaction times increase the chances of fraudulent transactions going undetected
        1. stolen data is used to generate unauthorized transactions
        2. advance fee fraud
          1. scams, in which an individual, or "businesses" offer something, but ask for money prior to the deal. In the end, they never pay.
          2. hacking
            1. gaining access to someone else's systems/data
            2. piracy
              1. usage of another persons work (copying) without permission
              2. data theft
                1. an example is when someone is leaving their job, they copy data from the old one and use it in their new one.

                  Annotations:

                  • Copying data from elsewhere and using it as your own.
                2. ransomware
                  1. using malware, they steal data and put a ransom on it for you to buy it back off them
                  2. phishing
                    1. often sending fake emails, to get personal details out of people.
                      1. look out for
                        1. greeting
                          1. address
                            1. forged link
                              1. request for personal info
                                1. sense of urgency
                                  1. poor grammar/ spelling
                                2. the message often has something convincing about winning money or banks.
                                  1. emails start with 'dear customer' or 'client' rather than your name
                                  2. a padlock or the 's' on 'https' are signs of if the links are safe
                                    1. a legitimate email will have a link with an 's' or secured padlock
                                3. Cyber security

                                  Annotations:

                                  • (information technology security)
                                  1. protects computer's network from theft or damage
                                  Show full summary Hide full summary

                                  Similar

                                  Types and Components of Computer Systems
                                  Jess Peason
                                  Input Devices
                                  Jess Peason
                                  Output Devices
                                  Jess Peason
                                  Computing
                                  Kwame Oteng-Adusei
                                  Pack of playing cards answer
                                  Karl Taylor
                                  Code Challenge Flow Chart
                                  Charlotte Hilton
                                  Computing Hardware - CPU and Memory
                                  ollietablet123
                                  Computer Systems
                                  lisawinkler10
                                  Computer science quiz
                                  Ryan Barton
                                  Input, output and storage devices
                                  Mr A Esch
                                  GCSE Computing - 4 - Representation of data in computer systems
                                  lilymate