Cyber crime
http://www.mekabay.com/overviews/glossary.pdf
http://news.bbc.co.uk/2/hi/uk/5400052.stm#sniffing
http://www.netlingo.com/word/
№ |
Term |
Definition |
Usage |
|
|
Bootlegger (n) |
a person engaged in illegal copying of software; an illegally copied software |
bootlegging (n); bootlegged (adj); syn. pirate, piracy |
|
|
Breach (n) |
an act of breaking or failing to observe a law, agreement, or code of conduct; disclosure of sensitive information to an unauthorized outsider |
a ~ of law/contract/policy/code of conduct; do sth in ~ of sth; syn. data leakage; violation, infringement, non-compliance |
|
|
Combat (v) |
fight against; oppose sth vigorously |
~ piracy/computer crime; syn. fight sth, struggle with sth |
|
|
Commit (v) |
do; perform; dedicate oneself to sth
|
~ a crime/murder/error/suicide; ~ oneself to sth; ~ sth to memory/ prison; committed (adj): ~ to a cause/principles/idea/doing sth; a ~ employee/worker; commitment (n): ~ of a crime/murder/suicide; syn. perpetrate |
|
|
Comply (v) |
meet specified standards; act in accordance with a wish or command |
~ with the rules/regulations/law/ standards; (non-)compliance (n); syn. conform to |
|
|
Copyright (n) |
the exclusive right given by law to an author to print, publish, and sell copies of his original work |
secure/protect/violate/infringe on the ~; ~ law/holder; copyrighted (adj), copyrighter (n); copywriting (n) ant. copyleft |
|
|
Crack (v) |
break or cause to break sth open or apart; find a solution to sth; decipher or interpret sth; break a security system for illegal reasons |
~ a joke/code/message; a tough nut to ~, ~ down on criminals; crack (n): a ~ dealer/seller; crack (v): monitor ~ abuse; cracking (n), syn. break, decipher, hack |
|
|
Crime (n) |
illegal activity punishable by law |
commit/prevent/report/fight (a) ~; punish sb for a ~; ~ rate/incidence; a victim of ~; petty/serious/violent/ organized ~; criminal (adj), criminally (adv), criminality (n), incriminate (v), incrimination (n); syn. felony, wrongdoing |
|
|
Cyberbullying (n) |
repeatedly harming or harassing other people online in a deliberate manner |
be subject to~; fall/become a victim of ~; syn. cyberstalking |
|
|
Cybercide (n) |
the deletion of an individual's entire online presences (the removal of all social media profiles, shared photos, blog posts, directory entries and so on) |
be prone to/commit ~; an act of ~; Cf. suicide, genocide, ecocide |
|
|
Cyberslacker (n) |
an employee that uses company resources, like a workplace computer and Internet connection, for personal reasons during working hours (playing games, shopping online or using social networking sites) |
cyberslacking (n): indulge in/engage in/combat ~ syn. cyberloafer |
|
|
Cybersquatting (n) |
p |
engage in/be involved in/combat ~ |
|
|
Data diddling (n) |
modifying data for fun and profit, e.g. modifying grades, changing credit ratings, altering security clearance information, fixing salaries, or circumventing book-keeping and audit regulations |
engage in/be caught ~; data diddler (n) |
|
|
Disseminate (n) |
scatter or spread widely, promulgate extensively; broadcast; disperse
|
~ information/viruses/knowledge/ ideas/news; dissemination (n) syn. spread, propagate, promulgate |
|
|
Filter (v) |
remove undesirable data by sifting |
~ a list of customers/incoming e-mail/traffic; syn. sift away |
|
|
Flooding (n) |
providing more input than the entity can process properly |
engage in/suspect/combat/protect against ~; flood (v), flooded (adj), flooding (n) Cf. mailbombing, packet monkey |
|
|
Fraud (n)
|
manipulation of data for criminal purposes, e.g. changing banking records to transfer money to an account |
a ~ scheme; control/commit/suspect/ combat/ protect against ~; in case of ~; fraudulence (n), fraudulent (adj), fraudulently (adv), fraudster (n) syn. cheating, swindling |
|
|
Hacker (n) |
someone who secretly uses or changes the information in other people's computer systems |
speed/teleport /ethical ~; hack (v), back-hack (v) syn. cracker
|
|
|
Identity theft (n) |
creating a false identity using someone else’s identifying information to make new credit cards or take loans |
commit an ~; protect from ~; accuse sb of ~ |
|
|
Intruder (n)
|
the one who puts oneself deliberately into a place or situation where one is unwelcome or uninvited |
network/computer/impudent ~; attack/alert an ~; intrude (v), un/intrusive (adj), intrusion (n); syn. invader, trespasser |
|
|
Jacking (n) |
taking sth in a manner forbidden by law, rules, or custom |
click/hi/page-~; engage in/be involved in/suspect/ combat/ protect against ~; create a click-~ site jack in (v); hi/click/page-~er; syn. steal Cf. identity theft |
|
|
Keylogger (n) |
program installed on a victim's machine that records every keystroke that a user makes for stealing login and password details |
keylogging (n): suspect/engage in/combat/protect against ~;
|
|
|
Mousetrapping (n) |
forcing an Internet user to stay on a particular website by triggering a mouse trap |
engage in/suspect/combat/protect against ~
|
|
|
Packet monkey (n) |
someone who intentionally floods a network server or router with data packets in order to make it unreachable by others |
Cf. flooding |
|
|
Phracking (n) |
a combination of phreaking with computer hacking |
engage in/suspect/combat/protect against ~; phracker (n) |
|
|
Phreaking (n) |
a person who hacks telephone systems, usually for the purpose of making free phone calls |
engage in/suspect/combat/protect against ~; phreaker (n) |
|
|
Piggyback (n) |
the one gaining unauthorized access to a computer system via another user's legitimate connection |
piggybacking (n): engage in/be involved in/be caught ~
|
|
|
Piracy (n) |
the act of illegally copying software, music, or movies that are copyright-protected |
computer/software ~; act of ~; engage in/suspect/combat/commit/ protect against ~; anti-piracy (n): ~ law/measures |
|
|
Pharming (n) |
misdirecting traffic from one website to a website controlled by a criminal hacker by altering the domain name system or configuration files on a victim’s computer |
engage in/be involved in/ suspect/combat/commit/protect against ~; pharmer (n) |
|
|
Phishing (n) |
sending e-mails or creating web pages that are designed to collect confidential information for penetration, financial fraud or identity theft |
engage in/be involved in/be caught ~; phisher (n)
|
|
|
Repudiation (n) |
rejection of a proposal or idea; refusal to fulfil or discharge an agreement, obligation, or debt |
~ of a law/contract/policy/idea/ principle; non-repudiation (n); repudiate (v) |
|
|
Salami theft/ slicing (n) |
stealing tiny amounts of money from each transaction |
engage in/be involved in/be caught ~
|
|
|
Scavenging (n) |
using discarded listings, tapes, or other information storage media to determine useful information such as access codes, passwords, or sensitive data |
engage in/be involved in/be caught ~ syn. dumpster diving
|
|
|
Spoofing (n) |
deceiving a system into thinking you are someone you really are not to bypass security measures |
IP ~; spoofer (n) |
|
|
Steal (v) |
take (another person’s property) without permission or legal right and without intending to return it |
~ sth from sb; stolen (adj), stealth (n), stealthy (adj), stealthily (adv); syn. theft (n) Cf. thief |
|
|
Trojan Horse (n) |
an innocent-looking program that has undocumented harmful functions |
download/detect/neutralize a ~; Cf. Easter egg, time bomb, zombie |
|
|
Trolling (n) |
an anti-social act of causing an interpersonal conflict and controversy online, purposely sowing hatred, bigotry, racism, etc. |
go ~; engage in/prevent/tackle/stop (an act of)/suffer from/reduce the risk of ~; troll (v)
|
|
|
Virus (n) |
a computer program designed to replicate and spread itself from one machine to another without the help of the user (unlike a worm, residing inside programs at all times) |
download/detect/neutralize/spread/disseminate a ~; Cf. bot, zombie |
|
|
Wiretapping (n) |
the interception of electronic communications in order to access information |
engage in/detect/be caught/protect against/from ~ |
|
|
Worm (n) |
a program which spreads through a computer system or network by replicating (like a virus) but without integrating itself into its executable code |
install/download/detect/neutralize/ spread/disseminate a ~ |
ACTIVITIES
Activity 1. Give synonyms and/or antonyms:
1. bootlegger |
|
2. combat |
|
3. committed to sth |
|
4. breach |
|
5. copyright |
|
6. piracy |
|
7. black-hat cracker |
|
Activity 2. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
|
commit |
|
|
intruder |
|
|
|
|
|
criminal |
|
|
steal |
|
|
|
|
|
fraudulently |
flood |
|
|
|
Activity 3. Give the terms suiting the definitions below:
1. stealing, jacking |
A modifying data for fun and profit |
2. keylogging |
B using company resources for personal reasons during working hours |
3. mousetrapping |
C taking sth in a manner forbidden by law, rules, or custom |
4. phreaking |
D forcing an Internet user to stay on a particular website |
5. data diddling |
E hacking telephone systems, usually for the purpose of making free phone calls |
6. pharming |
F recording every keystroke that a user makes for stealing login and password details |
7.cyberslacking |
G misdirecting traffic from one Website to a Website controlled by a criminal hacker |
8. spoofing |
H deceiving a system into thinking you are someone you really are not |
Activity 4. Complete the tables below with missing words of the given part of speech that form strong partnerships with the target vocabulary unit:
|
Verb |
Target vocabulary unit |
1 |
|
fraud |
2 |
|
|
3 |
|
|
4 |
|
|
5 |
|
|
Verb |
Target vocabulary unit |
1 |
|
a worm/virus |
2 |
|
|
3 |
|
|
4 |
|
|
5 |
|
|
6 |
|
|
Target vocabulary unit |
Nouns |
1 |
commit a/n
|
|
2 |
|
|
3 |
|
|
4 |
|
|
5 |
|
Activity 5. Name 4 kinds of malicious software and illustrate them with examples.
Activity 6. State the type of logical relations between the following words:
Concepts |
Type of logical relations |
1. bootlegging – piracy |
A. general and specific |
2. phracking - cracking |
B. cause and effect |
3. spoofing – identity theft |
C. contrast |
4. stealing – salami slicing |
D. method and purpose |
5. worm – virus |
E. part and whole |
6. cyberslacking – loss of productivity |
F. equivalence |
7. filter – firewall |
|
Activity 7. Decode a saying about crime and comment on it:
http://puzzlemaker.discoveryeducation.com/cryptogramSetupForm.asp
Activity 8. Explain the difference between the following concepts using the Venn diagram below:
stealing VS jacking |
phracking VS phreaking |
hijacking - page-jacking - click-jacking |
keylogging – mouse-trapping |
malware – grayware |
fraud - theft |
hacker - cracker |
Activity 8. Name at least 2 kinds of crime that involve:
1. violation of social norms
2. telephone calls
3. copyright violations
4. misdirecting or impeding traffic
5. stealing confidential data
6. identity theft
Activity 9. What kind of crime you might be a victim to if:
1. Your telephone/Internet bills have risen significantly.
2. Your account information has changed.
3. You receive threats and insults on the net.
4. The money in your bank account has disappeared.
5. You receive a lot of unwanted e-mails.
6. Your copyright is violated.
7. You can’t leave an Internet page.
Activity10. What could you do not to fall prey to Internet criminals (name at least 3 measures).
Activity 11. Name the crime prevention methods or devices and analyze them in terms of their:
1. mechanism
2. kinds
3. effectiveness
Activity 12. Describe an instance of your suffering from an Internet crime.
Activity 13. Semantic mapping: Draw a diagram reflecting the computer crime types.
Activity 14. Arrange the computer crimes in the ascending order of the difficulty of committing them.
Activity 15. Do a mini-research and add to the above list more recent types of computer crime.
TEST
1 |
Mark the odd word: a) oppose b) combat c) fight d) struggle |
2 |
All of these may be committed EXCEPT FOR: a) crime b) a mistake c) a murder d) suicide |
3 |
What is the logical relationship between the concepts “breach - compliance ”: a) general and specific b) cause and effect c) method and purpose d) contrast |
4 |
A hacker and a cracker differ mostly in the ___ of their activity. a) method b) purpose c) nature d) location |
5 |
Which of these is synonymous to the word “cyberbullying”: a) cyberslacking b) cyberstalking c) cybersquatting d) cyberloafing |
6 |
Modifying data for fun and profit is known as ___. a) phishing b) spoofing c) data diddling d) phreaking |
7 |
One can filter any of these EXCEPT FOR: a) fraud b) a list of customers c) incoming e-mail d) traffic |
8 |
What is the logical relationship between “malware” and “a virus”: a) general – specific b) method – purpose c) part – whole d) equivalence |
9 |
Names of all crimes which consist in taking sth in a manner forbidden by law, rules, or custom contain the root ___. a) cide b) jack c) tap d) cyber |
10 |
Choose the correct preposition: Anyone subject ___ cybercrime should be protected by law. a) of b) in c) to d) with |
11 |
The words “trolling”, “cyberbullying”, “cyberstalking” relate to: a) ill-treatment of people online b) loss of confidential information c) stealing sb’s property d) deceiving people |
12 |
The concepts of “keylogging”, “mousetrapping”, “pharming” relate to: a) manipulation of people b) loss of confidential information c) stealing sb’s property d) deceiving people |
13 |
The words “hijacking”, “pagejacking”, “clickjacking” relate to: a) loss of confidential information b) illegal takeover c) stealing sb’s property d) deceiving people |
14 |
The words “piracy”, “bootlegging”, “copyright” relate to: a) ill-treatment of people online b) loss of confidential information c) stealing sb’s intellectual property d) deceiving people |
15 |
All of these are synonymous to the word “disseminate ” EXCEPT FOR: a) promote b) spread c) propagate d) promulgate |
16 |
Purchasing a domain name that contains a well-known trademark or commercial name to sell it to the rightful owner for a big profit is known as ___. a) cyberslacking b) cybersquatting c) cybercide d) cyberbullying |
17 |
He is a convicted credit-card ___. a) fraudster b) fraud c) fraudulent d) fraudulence |
18 |
All of these collocate with the noun “worm” EXCEPT FOR: a) install b) commit c) download d) detect |
19 |
The difference between “copyright” and “copyleft” concerns mostly the authors’ ___ (their) work. a) income from b) manner of c) method of d) interest in |
20 |
A blackhat and a whitehat differ mostly in the ___. a) colour b) size c) shape d) purpose |
