|
|
1
|
(also known as a black hat hacker) is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security or gain access to software without paying royalties.
|
3
|
a feature or defect of a computer system that allows surreptitious unauthorized access to data.
|
4
|
is the environmentally responsible and eco-friendly use of computers and their resources.
|
5
|
forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source.
|
6
|
form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels.
|
7
|
a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.
|
9
|
a person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.
|
|
|
|
|
1
|
is a crime involving an attack or threat of attack coupled with a demand for money to avert or stop the attack.
|
2
|
computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.
|
8
|
software that automatically displays or downloads advertising material (often unwanted) when a user is online.
|
|
|