Flashcard (Front and Back)

Front (Question)
types of fraud and theft: Data diddling
Back (Answer)
individuals change data so that it is hard to determine that the resulting theft has occurred


Memory Work Out Sessions use brain research to accelerate and improve memorization. Automatically scheduled daily review drills ensure sure you don't forget.





or Find more than 100,000 other things to learn

Educators and Trainers:

Tour YoYoBrain's resources for learning and teaching
Previous Card See the whole card set Next Card


Comments:

Other flashcards from Flashcards from note: Coyle Ch. 9
Technologies that jeopardize online a...       Global unique identifiers (GUIDs),       To protect society, governments shoul...       Privacy at home:       Privacy at work:       Computer Crimes:       Cybercrimes:       Cyber law:       Scope of the Problem - in 2006       Types of computer crime Identify theft:       Types of Identify theft: Phishing:       Types of Identify theft: Malware (s...       types of computer crime: Spyware       types of spyware Adware       types of spyware Keyloggers:       types of computer crime: Computer vir...       types of Computer virus: file infectors       types of Computer virus Boot sector v...       types of Computer virus Macro viruses       Rogue forms of malware include:•       Time bomb:       Worm:       Denial of service (DoS) attack•       zombies,       botnet-       Trojan horse       types of fraud and theft Memory shavi...       types of fraud and theft Memory shavi...       types of fraud and theft Password ste...       Techniques to obtain passwords       types of fraud and theft: blackmail       types of fraud and theft: Forgery:       types of fraud and theft: Salami sha...       types of fraud and theft: Data diddl...       Types of computer criminals       Cyberstalkers:       Cyberbullies:       examples of internet scams       Computer security risk is:       Security options available for wirele...       Threats to the security of computer s...       To reduce security risks:       biometric authentication-       • Use an uninterruptible power supply...       Avoiding scams on the Internet and pr...       Encryption:       Cryptography:       Public Key Encryption       Digital signatures:       Digital certificates:      





App_store_badge
What's new | About Us | Privacy Policy | Copyright Policy | Contact Us

Copyright 2007-2025 YoYoBrain.com

Managed By W3mg