Computer Science, asked by sachinsundar6a201920, 5 months ago

plz dont spam it its so main

Attachments:

Answers

Answered by keyboardavro
2

Answer:

i am answering the short because all long its not taking

Explanation:

1. Cyber-crime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.

2. Spamming is the use of messaging systems to send an unsolicited message to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, or for any prohibited purpose.

3. Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. ... Also known as “white hats,” ethical hackers are security experts that perform these assessments.

4. Cracking is when someone performs a security hack for criminal or malicious reasons, and the person is called a “cracker.” Just like a bank robber cracks a safe by skillfully manipulating its lock, a cracker breaks into a computer system, program, or account with the aid of their technical wizardry.

5.The exclusive and assignable legal right, given to the originator for a fixed number of years, to print, publish, perform, film, or record literary, artistic, or musical material is known as copyright.

6. Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

7.The information about a particular person that exists on the internet as a result of their online activity is known as digital footprint

Similar questions