Article in International Journal of Computer Networks and Communications Security · June 016 citations 56 reads 15,158 authors: Some of the authors of this publication are also working on these related projects



Download 274,58 Kb.
Pdf ko'rish
bet22/28
Sana17.05.2023
Hajmi274,58 Kb.
#940219
1   ...   18   19   20   21   22   23   24   25   ...   28
Bog'liq
CybercrimeandCybercriminal-2016

3.11 Cyberlaundering
:
Cybercrime that comprises 
financial transactions using funds from criminal 
activities. Cyberlaundering is based on e-payments, 
digital money and illegal hardcash that is converted 
to illegal e-money.
3.12 Cyberstalking
:
Online activities used by 
perpetrators to monitor people without their 
consent. This illegal activity involves online and 
offline tasks to intimidate, blackmail or any 
unlawful motive against their victims. The best way 
to prosecute the attackers is gathering all evidence 
to support a police case. 
3.13 Cyberterrorism
:
Cyberterrorists may carry 
terrorism 
activities 
exploiting 
computer 
vulnerabilities that 
will 
impact society in 
metropolitan or regional areas. Attackers are 
motivated by political, religion, hacktivism or 
personal matters. 
3.14 Cybertheft:
Cybercriminals seek financial 
profit by stealing and selling information in every 
possible way. The dark web is where most of the 
stolen information is for sale, the most common 
sold goods are credit card numbers, online auction 
credentials and bank account numbers. 
3.15 Cybervandalism
:
Vandalism that takes place 
using computer technology. The most common 
attacks are website defacement, malware to delete 
data, DDoS and social media account hijacking. 
3.16 Cyberwarfare
:
Attacks in cyberspace that are 
aligned with a specific military operation or a 
national cybersecurity strategy to attack another 
nation‘s cyberspace. These operations have a 
military connotation that are led by commanders 
and executed by government cyber warriors. 
3.17 Data breach
:
Disclosure of data or 
information that breaks confidentiality that leads to 
the distribution in the public domain. The leakage 
can occur by insider agents or hacker attacks. 
Damages can affect or trigger corporate reputation, 
financial losses, lawsuits, share prices, fraud and 
physical assets.

Download 274,58 Kb.

Do'stlaringiz bilan baham:
1   ...   18   19   20   21   22   23   24   25   ...   28




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish