Cybercrime

Descrição

Year 8 Computing Mapa Mental sobre Cybercrime, criado por Nyah Smith em 29-01-2020.
Nyah Smith
Mapa Mental por Nyah Smith, atualizado more than 1 year ago
Nyah Smith
Criado por Nyah Smith mais de 4 anos atrás
22
0

Resumo de Recurso

Cybercrime
  1. Crimes committed utilizing computers, or the internet.

    Anotações:

    • any criminal activity carried out using the internet or computers.
    1. identity theft
      1. using stolen data, they pretend to be you, often spending money.
      2. transaction fraud

        Anotações:

        • Quicker transaction times increase the chances of fraudulent transactions going undetected
        1. stolen data is used to generate unauthorized transactions
        2. advance fee fraud
          1. scams, in which an individual, or "businesses" offer something, but ask for money prior to the deal. In the end, they never pay.
          2. hacking
            1. gaining access to someone else's systems/data
            2. piracy
              1. usage of another persons work (copying) without permission
              2. data theft
                1. an example is when someone is leaving their job, they copy data from the old one and use it in their new one.

                  Anotações:

                  • Copying data from elsewhere and using it as your own.
                2. ransomware
                  1. using malware, they steal data and put a ransom on it for you to buy it back off them
                  2. phishing
                    1. often sending fake emails, to get personal details out of people.
                      1. look out for
                        1. greeting
                          1. address
                            1. forged link
                              1. request for personal info
                                1. sense of urgency
                                  1. poor grammar/ spelling
                                2. the message often has something convincing about winning money or banks.
                                  1. emails start with 'dear customer' or 'client' rather than your name
                                  2. a padlock or the 's' on 'https' are signs of if the links are safe
                                    1. a legitimate email will have a link with an 's' or secured padlock
                                3. Cyber security

                                  Anotações:

                                  • (information technology security)
                                  1. protects computer's network from theft or damage

                                  Semelhante

                                  A level Computing Quiz
                                  Zacchaeus Snape
                                  Types and Components of Computer Systems
                                  Jess Peason
                                  Input Devices
                                  Jess Peason
                                  Output Devices
                                  Jess Peason
                                  Computing
                                  Kwame Oteng-Adusei
                                  Pack of playing cards answer
                                  Karl Taylor
                                  Code Challenge Flow Chart
                                  Charlotte Hilton
                                  Computing Hardware - CPU and Memory
                                  ollietablet123
                                  Computer Systems
                                  lisawinkler10
                                  Computer science quiz
                                  Ryan Barton
                                  Input, output and storage devices
                                  Mr A Esch