問題一覧
1
usually unsolicited commercial email dent from an unknown soyrce witb identifal massage sent to multiple recipients
Email Scam/Junk Mail/Spam Mail
2
is the same as physical stalking by hgiving unwanted obsessive attentuon to a specific person like following, secret servillance, presistent, and manipulating calling ang texting
Cyberstalking
3
is tge act of engaging on underage minor iny inappropriate sexual realtiionship through the internet
Online Prederation
4
loaded into users conputer without the users knowledge and perform malicious action
Virus
5
short for malicious software refers to any intrusive software developed by cybercriminal
Malware
6
is thvof saying mean things online, usually in all caps and often in a public forum with the intention to humillate
Flaming
7
The creation of email withforged sender address.
Email Spoofing
8
are mamware designed to allow an a trucker to remotely control an infected computer
Remote Access Trojan
9
are small programs or scripts that can negatively affect the health of your computer
Computer Viruses
10
created love worm
Onel De Guzman
11
unwanted email mostly from bots or advitisere, it can be used to send malware
Spam
12
is a scamming oractuce in which malicious code is installed on a personal computeror server, mis directing , users to fraudulent web sites without their knowledge and consent
Pharming
13
send users to fake website instead of the real website the user intended to visit
Pharming Attack
14
is bullying that takes place kver digitial devices like cellphone, computer and tablets
Cyberbullying
15
its goal to acquire sensitive personal information like passwords and credit card details
Phishing
16
a type of window that appears on top of (over) the browser window of a web site that a user visited
Pop-Ads
17
designed to block access to a computer system until a sum of money is paid
Ramsomeware
18
trick the user into posting that it is a security sofware
Rouge Security Software
19
is a program or a collection of malicious software tools that guve a threat actor remote access to and control over a computer or other system
Rootkit
20
is a threat that makes use of the world wide web to disperse cinceal, and update themeseleves with the intention of facilitating cybercrim
Internet Threats
21
a program designed to send you advertisement mostly as pop-ups
Adware
22
a program that runs in the background without you knowing it (thus called spy)
Spyware
23
used to record the keystroke done by users their passwoed or any other sensitive information
Keyloggers
24
a clever or expert programmer who can gain unathorize accesss to other computers
Hacker
25
disguised as a useful program but once downloaded or installed, leaves your pc unprotected and allows hackers to get your information
Trojan
26
stand alon malicious software that can self replicate and propagate via computer network w/o human help
Worms