SEARCH
🇬🇧
MEM
O
RY
.COM
4.37.48
Guest
Log In
Â
Homepage
0
0
0
0
0
Create Course
Courses
Last Played
Dashboard
Notifications
Classrooms
Folders
Exams
Custom Exams
Help
Leaderboard
Shop
Awards
Forum
Friends
Subjects
Dark mode
User ID: 999999
Version: 4.37.48
www.memory.com
You are in browse mode. You must login to use
MEM
O
RY
  Log in to start
Index
 »Â
Cyber 2
 »Â
Chapter 1
 »Â
Level 1
level: Level 1
Questions and Answers List
level questions: Level 1
Question
Answer
Exploit the victims emotional relationship for money or gifts
Romance scams
tricking people handing over sensitive information sometimes described as human hacking
Social engineering
mass distribution disguised as institutions
phishing and spoofing
oldest and best-known fraud cons trickster Englishmen to help sister escape from her capterby
Spanish prisoner
custom tailor attacks and pretends to be someone close to the victim
Speer phishing
website generated controversy free to access of scholarly application
Skyhub
extraordinary resilience to shut down attempts decentralize fragment internet make it difficult
Peer to peer sharing
scope and scale commercial sector reports largest financial loss 52.2 billion dollars
Computer software
persons can get paid and turn over coworkers unauthorized software
No piracy program
copy right trade secrets and trade marks
Intellectual property encompasses
some argue media personal interest generate personal concern Becker
Moral entrepreneurship
Department of HS bush administration created by Bush in the wake of 911
Homeland security, Department of HS bush administration created by Bush in the wake of 911
The process that allows communications to be encoded prior to transmission
Encryption
form of hacktivism attempt to ruin online sites form of protest
Website defacement
described hacking for political activism and protest
hacktivism
Nations critical information infrastructure-telle communications, internet, hardware and software (which is not classified)
Virtual sit-ins and blockades
form of hacktivism exposing collection of private info of the person coercing, shame, silence the person
Doxxon & leaking
Life in prison, cyber terrorist
Computer act of 1986 Patriot act of 2001
The exception 10,000$ in damages against government entities threats cyber terrorism
The exception 10,000$ in damages against government entities threats cyber terrorism
National critical info
4th answer