Professional Documents
Culture Documents
Cempedak - Computer Attacks
Cempedak - Computer Attacks
INTERNET
SEXTING AUCTION FRAUD
exchanging sexually explicit text using an Internet auction site
messages and revealing pictures with CYBER-BULLYING to defraud another person.
other people, usually by means of a
phone. using the Internet, cell phones, or other
communication technologies to support
deliberate, repeated and hostile behavior that
torments, threatens, harasses, humiliates or INTERNET
harms another person. MISINFORMATION
PODSLURPING using the Internet to spread false or
misleading information.
using a small device with storage
capacity to download unauthorized
SALAMI TECHNIQUE ECONOMIC
data from a computer.
ESPIONAGE
stealing tiny slices of money from
theft of information, trade
many different accounts.
secrets, and intellectual
property.
PIGGYBACKING
WAR DIALING
use of a neighbor’s Wi-Fi network, tapping
into a communications line and electronically
latching onto a legitimate user who
PHREAKING programming a computer to dial
thousands of phone lines searching
unknowingly carries the perpetrator into the
attacking phone systems to obtain free for dial-up modern lines.
system.
phone line access: use phone lines to
transmit malware: and to access, steal,
GROUP: CEMPEDAK and destroy data.
AC220B4E