The (1) hackers are individuals who violate computer security essentially for the purpose of being malicious or for personal gain. The (2) method of internet fraud involves a victim removing his or her credit card when paying for their merchandise and then the offender peers over the victim’s shoulder and memorizes the numbers. Activities associated with (3) include monitoring e-mail communication; sending e-mails that threaten, insult, or harass; and using the victim’s e-mail identity to send false messages to others or to purchase goods and services. The (4) Act was established to address various problems associated with the Internet including piracy.
Answers:
(1) Black hat
(2) Shoulder surfing
(3) Cyberstalking
(4) Digital Millennium Copyright Act (DMCA)