100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary Grade 12 Computers, Part of Your Life: Module 2.2 - Computer Applications Technology

Rating
-
Sold
-
Pages
3
Uploaded on
20-06-2023
Written in
2021/2022

I am a matriculant who achieved >90% for the final CAT exam. I have created a summary of Module 2.2: The Dangers of Computer Crime from the textbook "Computers, part of your life - Grade 12" to make your life easier and to save you time. This summary follows the CAPS curriculum.

Show more Read less
Institution
Course








Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Institution
Course
Schooljaar
200

Document information

Summarized whole book?
No
Which chapters are summarized?
Module 2.2
Uploaded on
June 20, 2023
Number of pages
3
Written in
2021/2022
Type
Summary

Subjects

Content preview

Module 2.2: The dangers of computer crime
Social engineering The use of techniques and deception to manipulate someone into giving out confidential
information (password, account no.) or into giving criminals access to their computer/premises.
Used to manipulate them, install malware, other fraudulent purposes
Malware Any software written with negative intentions

Techniques and tools of cybercrime
Phishing Attempts to con the user into giving out personal + confidential details (PIN no, passwords) by
posing as a legitimate organisation, usually via email
Pharming Scamming practice where user is automatically redirected to another (fake) website even when
the user types a ‘valid’ URL in browser, criminal can use any data entered

Click-jacking An attack where a site appears to one thing but your clicks are redirected to do something else
Spoofing E-mail spoofing is the forgery of an e-mail header so that the e-mail appears to be from a
different origin (or person)

Spyware Technique / software that tries to monitor and track the way you use your computer and then
reports this info to a 3rd party.

Keylogger (Type of spyware) Records your keystrokes as you type (… movements of your mouse, screen-
shots of what’s displayed on screen) in an attempt to discover your usernames + passwords.
Computer virus Malware written to disrupt the normal functioning of a person’s computer w/o their
knowledge/consent
Used to turn your computer into a ‘bot’ to spread malware/ create security loopholes for
programs to exploit
Computer worm Malware that is able to distribute itself over a network (normally via e-mail) w/o a person
having run an infected program.
Trojan Destructive program disguised as a useful application; rely on you to activate them
(can delete files on computer, scan computer for personal info)
Ransomware Malware that encrypts data (making it unavailable) until you pay a ransom fee
Prevent: continually make backups of data
Adware Software that downloads onto your computer + bombards your computer with adverts that
pop-up whenever you are connected to the internet = nuisance, can be malicious

Bot / ‘zombie’ A computer that has been compromised (or infected) & can be controlled remotely when it is
on + connected to the internet
*Botnet = many bots working together to bombard internet services e.g. creating email
accounts

Categories of computer crime Categories
of
computer
crime

Harrass- Internet Computers
ment attacks + theft


processing date/
identity copyrighted
bandwidth time + intellectual money
material
theft
power property
$3.96
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Nimbus2000 University of Cape Town
Follow You need to be logged in order to follow users or courses
Sold
12
Member since
2 year
Number of followers
8
Documents
14
Last sold
3 months ago

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions