Hacker- someone involved in computer security/ insecurity, specializing in the discovery of exploits in systems or in obtaining or preventing unauthorized access to systems through skills tactics and detailed knowledge.
Phishing- is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication pay pal, e-Bay and online banks are targets. Phishing is typically carried out by e-mailor instant messaging and often directs users to enter details at a web-site although phone contact has also been used.
Spamming – the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media instant messaging spam.
Botnet – a jargon term for a collection ofsoftware robots or bots they run autonomously and automatically, on groups of zombie computers.
Email spoofing – a term used to describe fraudulent e-mail activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source.
E-mail spoofing is a technique commonly used for spam e-mail and phishing to hide the origin of an e-mail message.
Cyber Terrorism - is unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
Cyber espionage- it involves the unauthorized probing to test a target computer`s configuration or evaluate its system defenses, or the unauthorized viewing and copying of data files.
Kenya Internet and Cyberspace Law :Terms Used in Cyber Crime
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment