Study sets, textbooks, questions
Upgrade to remove ads
Terms in this set (55)
a network of hijacked computers
hackers that control hijacked computers
inflating advertising revenue by clicking online ads numerous times
denial of service attack
overloading an internet service provider's email server by sending hundreds of email messages per second from randomly generated false addresses
sending an email instructing the recipient to do something or they will suffer adverse consequences
circulating lies or misleading information using the world's largest network
using the internet to disrupt communications and e-commerce
use of spyware to record a user's keystrokes
software that collects consumer surfing and purchasing data
diverting traffic from a legitimate web site to a hacker's web site to gain access to personal and confidential information
emails that look like they came from a legitimate source but are actually from a hacker who is trying to get the user to divulge personal information
emailing an unsolicited message to many people at the same time
a spam blog that promotes affiliated Web sites to increase their Google PageRank
software that monitors and reports a user's computing habits
making an email look like it came from someone else
Sets with similar terms
Accounting Information Systems: Chapter 6 terms
ACCT 404 Chp6
Computer Fraud and abuse techniques 2
AIS Computer Fraud
Sets found in the same folder
ACTG 134 Chapter 2
Accounting Information Systems Chapter 13
Accounting Midterm 1
ACTY 3130 Exam 1
Other sets by this creator
peachtree handout 1
peachtree handout 2
Study Guide CH 7
Study Guide CH 6
What did Harlow's research on rhesus monkeys reveal?
Give three examples of how the sociological perspective can be applied to your life.
Which of the following is not an example of a reference group? a. Rock-star subculture b. United States Military Academy c. Terrorists d. Mass media
How are social networks different from social aggregates?
Other Quizlet sets
MACRO Quiz 2 (Ch 5)
ACC105 Chapter 6 Smartbook: Employer Payroll Taxes…
What does the CAN-SPAM act provide?
The preferred method today of bot herders for command and control of zombies is?
Which historical macro virus sent emails out to the first 50 names of a user's Outlook address book?
A flooding attack denies the availability of the target machine by consuming most of the capacity of the network bottleneck link.