6. Computer Fraud and Abuse Techniques Flashcards
Explain how social engineering techniques are used to gain physical or logical access to computer resources
Social engineering refers to techniques or psychological tricks used to get people to comply with the perpetrator’s wishes in order to gain physical or logical access to a building, computer server or network.
Explain the factors that perpetrator’s take advantage of are the following
- Compassion
- Greed
- Sex appeal
- Sloth
- Trust
- Urgency
- Vanity
- Compassion, they need help
- Greed, people get something for free
- Sex appeal, flirtatious or they are simply hot
- Sloth, fraudster take advantage of lazy people
- Trust
- Urgency, it has to be right now
- Vanity, fraudster tell people they will be popular or successful
Why do perpetrators wants acces to gain physical or logical access to a building, computer server or network.
Usually to get the information needed to access a system and obtain confidential data.
Mention some types of attacks
Tip: hacking, social engineering and malware
Hacking
Unauthorized access, modification, or use of an electronic device or some element of a computer system.
Social Engineering
Techniques or tricks on people to gain physical or logical access to confidential information.
Malware
Software used to do harm.
What types of hacks can be used for embezzlement
Tip: salami, espionage and cyber-extortion
Salami technique: Taking small amounts at a time. Round-down fraud.
Economic espionage: Theft of information, intellectual property and trade secrets.
Cyber-extortion: Threats to a person or business online through e-mail or text messages unless money is paid.