null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
20670018
Cybercrime
Description
Year 8 Computing Mind Map on Cybercrime, created by Nyah Smith on 29/01/2020.
No tags specified
computing
computing
year 8
Mind Map by
Nyah Smith
, updated more than 1 year ago
More
Less
Created by
Nyah Smith
almost 5 years ago
25
0
0
Resource summary
Cybercrime
Crimes committed utilizing computers, or the internet.
Annotations:
any criminal activity carried out using the internet or computers.
identity theft
using stolen data, they pretend to be you, often spending money.
transaction fraud
Annotations:
Quicker transaction times increase the chances of fraudulent transactions going undetected
stolen data is used to generate unauthorized transactions
advance fee fraud
scams, in which an individual, or "businesses" offer something, but ask for money prior to the deal. In the end, they never pay.
hacking
gaining access to someone else's systems/data
piracy
usage of another persons work (copying) without permission
data theft
an example is when someone is leaving their job, they copy data from the old one and use it in their new one.
Annotations:
Copying data from elsewhere and using it as your own.
ransomware
using malware, they steal data and put a ransom on it for you to buy it back off them
phishing
often sending fake emails, to get personal details out of people.
look out for
greeting
address
forged link
request for personal info
sense of urgency
poor grammar/ spelling
the message often has something convincing about winning money or banks.
emails start with 'dear customer' or 'client' rather than your name
a padlock or the 's' on 'https' are signs of if the links are safe
a legitimate email will have a link with an 's' or secured padlock
Cyber security
Annotations:
(information technology security)
protects computer's network from theft or damage
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
Computing Hardware - CPU and Memory
ollietablet123
Computer Systems
lisawinkler10
Computer science quiz
Ryan Barton
Input, output and storage devices
Mr A Esch
GCSE Computing - 4 - Representation of data in computer systems
lilymate
Browse Library