Match the cybercrime term in Column 1 to its means of attack in Column 2
Column 1 Column 2
5. Spoofing a. Use of a telephone to obtain information
6. Vishing b. Use of a website or e-mail to obtain information
7. Phishing c. Use of a computer network to overload a system
8. Denial of Service d. Using trickery to gain access to a system
5. d
6. a
7. b
8. c
You might also like to view...
Race and ethnicity are often associated with specific types of violent crimes.
Answer the following statement true (T) or false (F)
Power legitimized over time becomes characterized as authority
Indicate whether the statement is true or false
Both male and female gang members spend a lot of their time "partying," "kicking it," and just "hanging out" and the use of drugs and alcohol is common
Indicate whether the statement is true or false
Which of the following is the most effective new crime-fighting tool?
A. DNA profiling B. Racial profiling C. Predictive policing D. Proactive policing