ACTG 474 Final - Computer Fraud Terms
With Solution
Adware - ANSWER software that collects consumer surfing and purchasing
data
Botnet - ANSWER a network of hijacked computers
Bot herder - ANSWER Hackers that control hijacked computers
Click fraud - ANSWER Inflating advertising revenue by clicking online ads
numerous times
DoS - ANSWER Overloading an internet service's provider's email server by
sending hundreds of email messages per second from randomly generated
false addresses
E-mail threats - ANSWER Sending an e-mail instructing the recipient to do
something or suffer adverse consequences.
Hijacking - ANSWER Gaining control of a computer to carry out unauthorized
illicit activities
Internet misinformation - ANSWER circulating lies or misleading information
using the world's largest network
, Internet terrorism - ANSWER Using the internet to disrupt communications
and e-commerce
Key logger - ANSWER Use of spyware to record a user's keystrokes.
Pharming - ANSWER Diverting traffic from a legitimate website to a hacker's
website to gain access to personal and confidential information
Phishing - ANSWER E-mails that look like they came from a legitimate source
but are actually from a hacker
Spamming - ANSWER E-mailing an unsolicited message to many people at
the same time
Splog - ANSWER A spam blog that promotes affiliated websites to increase
their Google PageRank
Spyware - ANSWER Software that monitors and reports a user's computing
habits
With Solution
Adware - ANSWER software that collects consumer surfing and purchasing
data
Botnet - ANSWER a network of hijacked computers
Bot herder - ANSWER Hackers that control hijacked computers
Click fraud - ANSWER Inflating advertising revenue by clicking online ads
numerous times
DoS - ANSWER Overloading an internet service's provider's email server by
sending hundreds of email messages per second from randomly generated
false addresses
E-mail threats - ANSWER Sending an e-mail instructing the recipient to do
something or suffer adverse consequences.
Hijacking - ANSWER Gaining control of a computer to carry out unauthorized
illicit activities
Internet misinformation - ANSWER circulating lies or misleading information
using the world's largest network
, Internet terrorism - ANSWER Using the internet to disrupt communications
and e-commerce
Key logger - ANSWER Use of spyware to record a user's keystrokes.
Pharming - ANSWER Diverting traffic from a legitimate website to a hacker's
website to gain access to personal and confidential information
Phishing - ANSWER E-mails that look like they came from a legitimate source
but are actually from a hacker
Spamming - ANSWER E-mailing an unsolicited message to many people at
the same time
Splog - ANSWER A spam blog that promotes affiliated websites to increase
their Google PageRank
Spyware - ANSWER Software that monitors and reports a user's computing
habits