COMPUTER THREATS SECURITY
WHAT IS A HACKER
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
reply to the email
|
|
delete the email
|
|
send some money
|
|
forward the email to a mutual friend
|
Detailed explanation-1: -Cyber-bullying, hacking, identity theft, and even using a work PC for personal business are all examples of computer abuse. While not always enforced, acts that constitute computer abuse was codified in the 1984 Computer Fraud and Abuse Act (CFAA) which is enforceable at the federal level.
Detailed explanation-2: -Computer crime-illegal acts in which computers are the primary tool-costs the world economy many billions of dollars annually. Computer abuse does not rise to the level of crime, yet it involves unethical use of a computer.
Detailed explanation-3: -Cybercriminals are individuals or teams of people who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, and generating profit.