There is a fairly long list of ways in which people commit cybercrimes (crimes committed using computer technology). Some are simply mildly irritating, while others range from financially disastrous to life-threatening.
In this post:
See also:

1. List
Here is an (incomplete) list of terms you need to study:
- Malware
- Social Engineering
- Catfishing
- Pharming
- Phishing (Smishing)
- Spearphishing
- Scareware
- Spoofing is when something (a person, program or website) successfully identifies as another by falsifying data or impersonating someone or something else.
- DDoS
- Hacking
- Spam
- Click-jacking
Common assessment questions include asking you to describe the difference between the types of techniques.
2. Categories
3. How malware is used
- Identity theft
- Fraud
- Industrial espionage
- Sabotage
- Theft of data
- Cyber terrorism
References:
- Wikimedia contributors. (2023) Social engineering (security). Available at: https://en.wikipedia.org/wiki/Social_engineering_(security) (Accessed: 2 November 2023).