Secretly changing an already open browser tab Tabnapping
2. Using social networking to harass another person Cyber Bullying 3. Unauthorized access, alteration or use of an electronic device or component of an information technology system Hacking 4. It uses email messages to send junk messages Email Spam 5. Use to hide the presence of trap doors, sniffers, and key loggers; conceal software that originates a dos or an e-mail spam attack; and access user names and log in information Key Logging /// Rootkit 6. Break into system’s defense, steal the file containing valid passwords, decrypt them, and use them to access programs, files and data Password Cracking 7. Making an email look like it came from someone else Spoofing 8. Threatens to harm business or an individual if a specific amount is not provided Cyber Extortion 9. 9. 10. 9 11. 9 12. 9 13. 9 14. 9 15. 9 16. Cross Site Scripting is an attack between the time a new software vulnerability is discovered and the time a software developer releases a patch that fixes the problem False 17. Looking for unsecured wireless networks in a vehicle War Driving 18. Using the internet to disrupt e-commerce and communications Internet Terrorism 19. Using an invented scenario to gain confidential information Pretexting 20. This is an attack on the telephone system for the purpose of maiking toll-free telephone call Phising 21. Unauthorized copying or distribution of copyrighted software Software Piracy 22. Unauthorized use of special system programs to bypass regular system controls Superzapping
1. Allows user to override regular system orders Trap Door
2. It disrupts your internet activity which targets your data and commits crimes Denial of Service 3. It is the embezzlement of a small amount of funds. 4. This happens when the amount of data exceeds its capacity, causing the code or system to overwrite Buffer Overflow Attack