1. Salami Shaving
| A. Leaving, within a completed program, an illicit program that allows unauthorised - and unknown - entry.
|
2. Denial of Service attack
| B. Using another person’s identification code or using that person’s files before he or she has logged off.
|
3. Trojan Horse
| C. Adding concealed instructions to a computer program so that it will still work but will also perform prohibited duties. In other words, it appears to do something useful but actually does something destructive in the background.
|
4. Trapdoors
| D. Tricking a user into revealing confidential information such as an access code or a credit-card number.
|
5. Mail bombing
| E. Inundating an email address with thousands of messages, thereby slowing or even crashing the server.
|
6. Software Piracy
| F. Manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts and accumulated elsewhere. The victims are often unaware of the crime because the amount taken from any individual is so small.
|
7. Piggybacking
| G. Unauthorised copying of a program for sale or distributing to other users.
|
8. Phishing
| H. Swamping a server with large numbers of requests.
|
9. Defacing
| I. Redirecting anyone trying to visit a certain site elsewhere.
|
10. Hijacking
| J. Changing the information shown on another person's website.
|