IELTS Vocabulary List: CRIME
Phishing
Explanation: A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
Example: "The company's employees received phishing emails that appeared to be from their bank."
Malware
Explanation: Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Example: "The malware infected thousands of computers, causing significant data loss."
Hacking
Explanation: Unauthorized intrusion into a computer or network.
Example: "Hacking into the government database resulted in severe legal consequences for the offenders."
Ransomware
Explanation: Malware that encrypts a user's data and demands payment for the decryption key.
Example: "The hospital's systems were paralyzed by ransomware, demanding a hefty ransom in Bitcoin."
DDoS Attack
Explanation: A distributed denial-of-service attack aimed at overwhelming a network with a flood of internet traffic.
Example: "The website was taken offline by a DDoS attack, disrupting services for hours."
Identity Theft
Explanation: The fraudulent acquisition and use of someone's personal information, usually for financial gain.
Example: "Online identity theft has become increasingly common with the rise of digital banking."
Social Engineering
Explanation: Manipulating individuals into divulging confidential information.
Example: "The hacker used social engineering tactics to trick the employee into revealing their password."
Spyware
Explanation: Software that secretly monitors and gathers user information without their knowledge.
Example: "The spyware collected sensitive data from the victim's computer over several months."
Encryption
Explanation: The process of converting information into code to prevent unauthorized access.
Example: "Using strong encryption can protect sensitive data from cybercriminals."
Firewall
Explanation: A network security system that monitors and controls incoming and outgoing network traffic.
Example: "A robust firewall is essential for protecting against cyber threats."
Trojan Horse
Explanation: Malware disguised as legitimate software.
Example: "The Trojan horse downloaded a keylogger onto the victim's computer."
Botnet
Explanation: A network of private computers infected with malicious software and controlled as a group.
Example: "The botnet was used to launch coordinated cyber-attacks on multiple targets."
Keylogger
Explanation: A type of surveillance software that records keystrokes made by a user.
Example: "The keylogger captured all the passwords typed on the compromised computer."
Zero-Day Exploit
Explanation: An attack that occurs on the same day a vulnerability is discovered in software.
Example: "A zero-day exploit in the operating system allowed hackers to access sensitive data."
Data Breach
Explanation: The unauthorized access and retrieval of sensitive information.
Example: "The data breach exposed personal information of millions of users."
Cyber Espionage
Explanation: The use of computer networks to gain illicit access to confidential information, typically for political or military gain.
Example: "Cyber espionage activities have increased among rival nations."
Brute Force Attack
Explanation: An attempt to crack a password or encryption by trying all possible combinations.
Example: "The brute force attack eventually succeeded in breaking the weak password."
Backdoor
Explanation: A method of bypassing normal authentication to gain access to a system.
Example: "The attackers installed a backdoor in the software to access the network later."
Cybersecurity
Explanation: Measures taken to protect a computer or computer system against unauthorized access or attack.
Example: "Investing in cybersecurity is crucial for safeguarding company information."
Digital Forensics
Explanation: The process of uncovering and interpreting electronic data for use in a court of law.
Example: "Digital forensics played a vital role in solving the cybercrime case."
Larceny
Explanation: The unlawful taking of personal property with intent to deprive the rightful owner of it permanently.
Example: "He was charged with larceny after stealing several electronics from the store."
Burglary
Explanation: Unlawful entry into a building with intent to commit a crime, usually theft.
Example: "The burglary occurred while the homeowners were on vacation."
Robbery
Explanation: The act of taking property unlawfully from a person by force or threat of force.
Example: "The bank robbery was over in minutes, but it left the staff traumatized."
Shoplifting
Explanation: The act of stealing goods from a store.
Example: "The teenager was caught shoplifting a pair of sunglasses."
Pickpocketing
Explanation: Stealing from a person's pockets, often in a crowded place.
Example: "Tourists are often warned about pickpocketing in busy areas."
Embezzlement
Explanation: The theft or misappropriation of funds placed in one's trust or belonging to one's employer.
Example: "The accountant was arrested for embezzlement after diverting company funds to his account."
Fraud
Explanation: Wrongful or criminal deception intended to result in financial or personal gain.
Example: "She was convicted of fraud for falsifying financial statements."
Carjacking
Explanation: The act of forcefully stealing an occupied car.
Example: "The carjacking incident was caught on the parking lot's security cameras."
Looting
Explanation: Stealing goods, typically during a war or riot.
Example: "The store was left in ruins after the looting during the protests."
Grand Theft
Explanation: A category of theft that involves the unlawful taking of property valued above a certain amount.
Example: "They were charged with grand theft for stealing luxury cars."
Identity Fraud
Explanation: A subtype of identity theft where someone uses another person's personal information for fraudulent purposes.
Example: "Identity fraud can devastate a person's financial standing."
Arson
Explanation: The criminal act of deliberately setting fire to property.
Example: "The warehouse fire was determined to be a case of arson."
Heist
Explanation: A robbery from an institution such as a bank or museum.
Example: "The jewel heist was meticulously planned and executed."
Smuggling
Explanation: The illegal movement of goods into or out of a country.
Example: "The authorities intercepted the smuggling operation at the border."
Counterfeiting
Explanation: The production of imitation currency, goods, or documents with the intent to deceive.
Example: "He was arrested for counterfeiting after producing fake money."
Vandalism
Explanation: Deliberate destruction or damage to public or private property.
Example: "The historic monument was defaced in an act of vandalism."
Extortion
Explanation: The practice of obtaining something, especially money, through force or threats.
Example: "The gang was involved in extortion, demanding protection money from local businesses."
Forgery
Explanation: The action of forging a document, signature, or artwork.
Example: "The art dealer was convicted of forgery after selling counterfeit paintings."
Blackmail
Explanation: The act of demanding money or another benefit from someone in return for not revealing compromising information.
Example: "She fell victim to blackmail after her private messages were stolen."
Piracy
Explanation: The unauthorized use or reproduction of another's work.
Example: "Software piracy has become a growing concern for developers."
Loot
Explanation: Goods stolen, especially during a war or riot.
Example: "The thieves absconded with a significant loot from the jewelry store."
Fence
Explanation: A person who buys and sells stolen goods.
Example: "The police arrested the fence who was dealing in stolen electronics."
Mugging
Explanation: Assaulting and robbing someone in a public place.
Example: "The elderly man was the victim of a mugging while walking home."
Pilfering
Explanation: The act of stealing small amounts or things of little value.
Example: "The employee was caught pilfering office supplies."
Scam
Explanation: A dishonest scheme or fraud.
Example: "The online scam tricked many people into providing their credit card details."
Racketeering
Explanation: The criminal act of engaging in a racket, such as extortion or fraud.
Example: "They were charged with racketeering for running an illegal gambling operation."
Heist
Explanation: A robbery or holdup, particularly of a significant magnitude.
Example: "The museum heist resulted in the loss of priceless artworks."
Swindle
Explanation: To cheat or defraud someone of money or property.
Example: "The con artist swindled investors out of millions of dollars."
Trespassing
Explanation: Entering someone's land or property without permission.
Example: "The farmer filed a complaint against the hunters for trespassing."
Casing
Explanation: The act of surveying a location with intent to commit a crime.
Example: "The burglars spent days casing the neighborhood before the break-in."