adware - ** VERIFIED ANSWERS **✔✔Software that collects consumer surfing and purchasing
data
Botnet - ** VERIFIED ANSWERS **✔✔A network of hijacked computers
Bot herder - ** VERIFIED ANSWERS **✔✔Hackers that control hijacked computers.
Click fraud - ** VERIFIED ANSWERS **✔✔Inflating advertising revenue by clicking online ads
numerous times
DoS - ** VERIFIED ANSWERS **✔✔Overloading an Internet service provider's e‐mail server by
sending hundreds of e‐mail messages per second from randomly generated false addresses
E‐mail threats - ** VERIFIED ANSWERS **✔✔Sending an e‐mail instructing the recipient to do
something or they will suffer adverse consequences.
Hijacking - ** VERIFIED ANSWERS **✔✔Gaining control of a computer to carry out unauthorized
illicit activities.
Internet misinformation - ** VERIFIED ANSWERS **✔✔Circulating lies or misleading information
using the world's largest network.
Internet terrorism - ** VERIFIED ANSWERS **✔✔Using the Internet to disrupt communications
and e‐commerce
Key logger - ** VERIFIED ANSWERS **✔✔Use of spyware to record a user's keystrokes
, Pharming - ** VERIFIED ANSWERS **✔✔Diverting traffic from a legitimate Web site to a hacker's
Web site to gain access to personal and confidential information
Phishing - ** VERIFIED ANSWERS **✔✔E‐mails that look like they came from a legitimate source
but are actually from a hacker who is trying to get the user to divulge personal information.
Spamming - ** VERIFIED ANSWERS **✔✔E‐mailing an unsolicited message to many people at the
same time.
Splog - ** VERIFIED ANSWERS **✔✔A spam blog that promotes affiliated Web sites to increase
their Google PageRank
Spyware - ** VERIFIED ANSWERS **✔✔Software that monitors and reports a user's computing
habits.
Spoofing - ** VERIFIED ANSWERS **✔✔Making an e‐mail look like it came from someone else
Typosquatting - ** VERIFIED ANSWERS **✔✔Creating Web sites with names similar to real Web
sites so users making errors while entering a Web site name are sent to a hacker's site.
Bluebugging - ** VERIFIED ANSWERS **✔✔Making phone calls and sending text messages using
another user's phone without physically holding that phone
Bluesnarfing - ** VERIFIED ANSWERS **✔✔Capturing data from devices that use Bluetooth
technology
Eavesdropping - ** VERIFIED ANSWERS **✔✔Intercepting and/or listening in on private voice and
data transmissions
Evil twin - ** VERIFIED ANSWERS **✔✔A rogue wireless access point masquerading as a
legitimate access point
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Fordenken. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $16.99. You're not tied to anything after your purchase.