You are on page 1of 1

CROSS-SITE HACKING BRUTE FORCE

SCRIPTING (XSS) ATTACK


unauthorized access, modification, trial-and-error method that uses
a vulnerability in dynamic web pages that or use of an electronic device or software to guess information,
allows an attacker to bypass a browser’s some element of a computer system. such as the user ID and password,
security mechanisms and instruct the victim’s needed to gain access to a
browser to execute code, thinking it came system.
from the desired website.
HIJACKING
gaining control of someone else’s
CLICK FRAUD computer to carry out illicit activities
INTERNET PUMP- such as sending spam without the

AND-DUMP FRAUD manipulating the number of computer user’s knowledge.


SPAMMING
times and ad is clicked on to
using the Internet to pump up the inflate advertising bills. simultaneously sending the same
price of a stock and then sell it. unsolicited message to many people,
often in an attempt to sell them
something.
CRYPROCURRENCY
SOFTWARE PIRACY FRAUD
defrauding investors in a variety of
cryprocurrency-related fraud schemes. PASSWORD
the unauthorized copying or
distribution of copyrighted
such as fake initial coin offerings and
fake exchanges and wallets.
CRACKING
recovering passwords by trying every
software.
possible combination of upper-and-lower-
case letters, numbers, and special
characters and comparing them to a
cryptographic hash of the password.
SPOOFING
MASQUERADING /
altering some part of an electronic IMPERSONATION
communication to make it look as if Computer
someone else sent the communication in
order to gain the trust of the recipient. Attacks gaining access to a system by
pretending to be an authorized
user.

INTERNET
SEXTING AUCTION FRAUD
exchanging sexually explicit text using an Internet auction site
messages and revealing pictures with CYBER-BULLYING to defraud another person.
other people, usually by means of a
phone. using the Internet, cell phones, or other
communication technologies to support
deliberate, repeated and hostile behavior that
torments, threatens, harasses, humiliates or INTERNET
harms another person. MISINFORMATION
PODSLURPING using the Internet to spread false or
misleading information.
using a small device with storage
capacity to download unauthorized
SALAMI TECHNIQUE ECONOMIC
data from a computer.
ESPIONAGE
stealing tiny slices of money from
theft of information, trade
many different accounts.
secrets, and intellectual
property.

PIGGYBACKING
WAR DIALING
use of a neighbor’s Wi-Fi network, tapping
into a communications line and electronically
latching onto a legitimate user who
PHREAKING programming a computer to dial
thousands of phone lines searching
unknowingly carries the perpetrator into the
attacking phone systems to obtain free for dial-up modern lines.
system.
phone line access: use phone lines to
transmit malware: and to access, steal,
GROUP: CEMPEDAK and destroy data.
AC220B4E

You might also like