You are on page 1of 1

Eavesdropping- The term 'eavesdropping' is used to refer to the interception of communication

between two parties by a malicious third party.

Industrial espionage- Industrial espionage is the covert and sometimes illegal practice of
investigating competitors to gain a business advantage. The target of investigation might be a
trade secret such as a proprietary product specification or formula, or information about business
plans.

Spam- irrelevant or unsolicited messages sent over the Internet, typically to a large number of
users, for the purposes of advertising, phishing, spreading malware, etc.

Identity theft- Identity theft is the crime of obtaining the personal or financial information of
another person for the sole purpose of assuming that person's name or identity to make
transactions or purchases. Identity theft is committed in many different ways

Credit Card Fraud- Credit card fraud is the unauthorized use of another person’s credit card—or
card information—to make purchases or access funds through cash advances using the victim’s
account.

Botnet- a network of private computers infected with malicious software and controlled as a
group without the owners' knowledge, e.g. to send spam.

Denial of Service- an interruption in an authorized user's access to a computer network, typically


one caused with malicious intent.

Phishing- the fraudulent practice of sending emails purporting to be from reputable companies in
order to induce individuals to reveal personal information, such as passwords and credit card
numbers."an email that is likely a phishing scam"

Pharming- the fraudulent practice of directing Internet users to a bogus website that mimics the
appearance of a legitimate one, in order to obtain personal information such as passwords,
account numbers, etc.

Malware- the term malware is a contraction of malicious software. Put simply, malware is any
piece of software that was written with the intent of doing harm to data, devices or to people.

You might also like