![Technology / Computer network security / Computer crimes / Rogue software / Spyware / Social engineering / Pharming / Dumpster diving / Phishing / Espionage / Malware / Cyberwarfare Technology / Computer network security / Computer crimes / Rogue software / Spyware / Social engineering / Pharming / Dumpster diving / Phishing / Espionage / Malware / Cyberwarfare](https://www.pdfsearch.io/img/27b9a5a7ee5003dbd2b06cbe1a6576c8.jpg) Date: 2014-02-04 08:47:54Technology Computer network security Computer crimes Rogue software Spyware Social engineering Pharming Dumpster diving Phishing Espionage Malware Cyberwarfare | | Glossary of Common Terms This is a listing of some of the key words, concepts and slang used to describe identity crimes and the tools/techniques used by perpetrators. The language of identity crimes changes often as perAdd to Reading ListSource URL: www.theiacp.orgDownload Document from Source Website File Size: 423,18 KBShare Document on Facebook
|