When financial or personal information is stolen through the use of computer science in some sort of illegal use or fraudulent activity, it is called ______________.

a. hacker
b. cyber-terrorism
c. cyber-marketing
d. cyber-slacking
e. cyber-squatting