ACC 321 Exam 2 Flashcards

1
Q

Creating cash using the lag between the time a check is deposited and the time it clears the bank.

A

Check kiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Concealing the theft of cash by means of a series of delays in posting collections to accounts receivable.

A

Lapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A text file created by a website and stored on a visitor’s hard drive.

  • store information about who the user is and what the user has done on the site.
A

Cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dishonest conduct by those in power which often involves actions that are illegitimate, immoral, or incompatible with ethical standards. Examples include bribery and bid rigging.

A

Corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Misrepresenting or leaving out facts in order to promote an investment that promises fantastic profits with little or no risk. Examples include Ponzi schemes and securities fraud.

A

Investment fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Any type of fraud that requires computer technology to perpetrate.

A

Computer fraud or cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Any and all means a person uses to gain an unfair advantage over another person.

A

Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements

A

Fraudulent financial reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Theft of company assets by employees.

A

Misappropriation of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The condition or situation that allows a person or organization to commit and conceal a dishonest act and convert it to personal gain.

A

Opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A person’s incentive or motivation for committing fraud.

A

Pressure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The excuse that fraud perpetrators use to justify their illegal behavior.

A

Rationalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An intentional act where the intent is to destroy a system or some of its components.

A

Sabotage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Typically, businesspeople who commit fraud.

  • usually resort to trickery or cunning, and their crimes usually involve a violation of trust or confidence.
A

White-collar criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spyware that causes banner ads to pop up on a monitor, collects information about the user’s web-surfing and spending habits, and forwards it to the adware creator, often an advertising or media organization.

  • usually comes bundled with freeware and shareware downloaded from the Internet.
A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Gaining control of someone else’s computer to carry out illicit activities, such as sending spam without the computer user’s knowledge.

A

Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A network of powerful and dangerous hijacked computers that are used to attack systems or spread malware.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hijacked computers, typically part of a botnet, that are used to launch a variety of Internet attacks.

A

Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The person who creates a botnet by installing software on PCs that responds to the bot herder’s electronic instructions. This control over the PCs allows the ______ to mount a variety of Internet attacks.

A

bot herder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Trial-and-error method that uses software to guess information, such as the user ID and the password, needed to gain access to a system.

A

Brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Recovering passwords by trying every possible combination of upperand lower-case letters, numbers, and special characters and comparing them to a cryptographic hash of the password.

A

Password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When the amount of data entered into a program is greater than the amount of the input buffer. The input overflow overwrites the next computer instruction, causing the system to crash. Hackers exploit this by crafting the input so that the overflow contains code that tells the computer what to do next. This code could open a back door into the system.

A

Buffer overflow attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

(insertion) Inserting a malicious SQL query in input such that it is passed to and executed by an application program. This allows a hacker to convince the application to run SQL code that it was not intended to execute.

A

SQL injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Taking control of someone else’s phone to make or listen to calls, send or read text messages, connect to the Internet, forward the victim’s calls, and call numbers that charge fees.

A

Bluebugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Making a sender address and other parts of an e-mail header appear as though the e-mail originated from a different source.

A

E-mail spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Displaying an incorrect number on the recipient’s caller ID display to hide the caller’s identity.

A

Caller ID spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Activities performed on stolen credit cards, including making a small online purchase to determine whether the card is still valid and buying and selling stolen credit card numbers.

A

Carding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Planting a small chip that records transaction data in a legitimate credit card reader. The chip is later removed or electronically accessed to retrieve the data recorded on it.

A

Chipping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A fake EMV chip is inserted in a stolen card. When a purchase is declined, the perpetrator persuades the clerk to let the card be swiped, thereby bypassing the EMV verification.

A

EMV chip bypass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

(XSS) A vulnerability in dynamic web pages that allows an attacker to bypass a browser’s security mechanisms and instruct the victim’s browser to execute code, thinking it came from the desired website.

A

Cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Hacking into and hijacking computing resources to mine cryptocurrency, thereby avoiding costs that can outweighs the value of the crypto mined.

A

Crypto jacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Hacking into a wallet or using social engineering tactics to trick a person into revealing the digital keys needed to access their blockchain account.

A

Crypto wallet attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Manipulating the number of times an ad is clicked on to inflate advertising bills. Companies advertising online pay from a few cents to over $10 for each click on their ads.

A

Click fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The unauthorized copying or distribution of copyrighted software.

A

Software piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Threatening to harm a company or a person if a specified amount of money is not paid.

A

Cyberextortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Software that encrypts programs and data until a ransom is paid to remove it.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Using computer technology to support deliberate, repeated, and hostile behavior that torments, threatens, harasses, humiliates, embarrasses, or otherwise harms another person.

A

Cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A computer attack in which the attacker sends so many e-mail bombs or web page requests, often from randomly generated false addresses, that the Internet service provider’s e-mail server or the web server is overloaded and shuts down.

A

Denial-of-service attack (DoS)

39
Q

Software that generates user ID and password guesses using information about the targeted company and a dictionary of possible user IDs and passwords to reduce the number of guesses required.

A

Dictionary attack

40
Q

Listening to private communications or tapping into data transmissions intended for someone else. One way to intercept signals is by setting up a wiretap.

A

Eavesdropping

41
Q

Double-swiping a credit card in a legitimate terminal or covertly swiping a credit card in a small, hidden, handheld card reader that records credit card data for later use.

A

Skimming

42
Q

Theft of information, trade secrets, and intellectual property.

A

Economic espionage

43
Q

Threats sent to victims by e-mail. The threats usually require some follow-up action, often at great expense to the victim.

A

E-mail threats

44
Q

Using an Internet auction site to defraud another person.

A

Internet auction fraud

45
Q

Techniques which use malware to infect online checkout pages and steal a customer’s personal and payment information.

A

E-skimming

46
Q

A wireless network with the same name (Service Set Identifier) as a legitimate wireless access point.

A

Evil twin

47
Q

Setting up similarly named websites so that users making typographical errors when entering a website name are sent to an invalid site.

A

Typosquatting/URL hijacking

48
Q

Unauthorized access, modification, or use of an electronic device or some element of a computer system.

A

Hacking

49
Q

Making a sender address and other parts of an e-mail header appear as though the e-mail originated from a different source.

A

E-mail spoofing

50
Q

Assuming someone’s identity, usually for economic gain, by illegally obtaining confidential information such as a Social Security number or a bank account or credit card number.

A

Identity Theft

51
Q

Using the Internet to spread false or misleading information.

A

Internet misinformation

52
Q

Using the Internet to pump up the price of a stock and then sell it.

A

Internet pump-and-dump fraud

53
Q

Software that records computer activity, such as a user’s keystrokes, e-mails sent and received, websites visited, and chat session participation.

A

Keylogger

54
Q

Inserting a sleeve into an ATM that prevents it from ejecting the card. The perpetrator pretends to help the victim, tricking the person into entering the PIN again. Once the victim gives up, the thief removes the card and uses it and the PIN to withdraw money.

A

Lebanese looping

55
Q

Any software that is used to do harm.

A

Malware

56
Q

A hacker placing himself between a client and a host to intercept communications between them; also called session hijacking.

A

Man-in-the-middle attack (MITM)

57
Q

Gaining access to a system by pretending to be an authorized user. This requires that the perpetrator know the legitimate user’s ID and passwords.

A

Masquerading/impersonation

58
Q

(1) Tapping into a communications line and electronically latching onto a legitimate user who unknowingly carries the perpetrator into the system.

(2) The clandestine use of a neighbor’s Wi-Fi network.

(3) An unauthorized person following an authorized person through a secure door, bypassing physical security controls.

A

Piggybacking

59
Q

Programs that capture data from information packets as they travel over the Internet or company networks. Captured data is sifted to find confidential or proprietary information.

A

Packet sniffers

60
Q

A program that can merge confidential information with a seemingly harmless file, password protect the file, and send it anywhere in the world, where the file is unlocked and the confidential information is reassembled.

The host file can still be heard or viewed because humans are not sensitive enough to pick up the slight decrease in image or sound quality.

A

Steganography program

61
Q

Software program flaws that a hacker can exploit to either crash a system or take control of it.

A

Vulnerabilities

62
Q

An attack between the time a new software vulnerability is discovered and “released into the wild” and the time a software developer releases a patch to fix the problem.

A

Zero-day attack

63
Q

Code released by software developers that fixes a particular vulnerability.

A

Patch

64
Q

Attacking phone systems to obtain free phone line access; use phone lines to transmit malware; and to access, steal, and destroy data.

A

Phreaking

65
Q

Sending an electronic message pretending to be a legitimate company, usually a financial institution, and requesting information or verification of information and often warning of a consequence if it is not provided. The request is bogus, and the information gathered is used to commit identity theft or to steal funds from the victim’s account.

A

Phishing

66
Q

Redirecting website traffic to a spoofed website.

A

Pharming

67
Q

Using an invented scenario (the pretext) that creates legitimacy in the target’s mind in order to increase the likelihood that a victim will divulge information or do something.

A

Pretexting

68
Q

Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the product.

A

Posing

69
Q

Using a small device with storage capacity (iPod, flash drive) to download unauthorized data from a computer.

A

Podslurping

70
Q

Stealing tiny slices of money from many different accounts.

A

Salami technique

71
Q

Instructing the computer to round down all interest calculations to two decimal places. The fraction of a cent rounded down on each calculation is put into the programmer’s account. Most frequently found in financial institutions that pay interest.

A

Round-down fraud

72
Q

Exchanging sexually explicit text messages and revealing pictures with other people, usually by means of a phone.

A

Sexting

73
Q

A means of concealing system components and malware from the operating system and other programs; can also modify the operating system.

A

Rootkit

74
Q

A segment of executable code that attaches itself to a file, program, or some other executable system component. When the hidden program is triggered, it makes unauthorized alterations to the way a system operates.

A

Virus

75
Q

Malicious software of no benefit that is sold using scare tactics.

A

Scareware

76
Q

Searching documents and records to gain access to confidential information.

  • methods include searching garbage cans, communal trash bins, and city dumps.
A

Scavenging/dumpster diving

77
Q

When perpetrators look over a person’s shoulders in a public place to get information such as ATM PIN numbers or user IDs and passwords.

A

Shoulder surfing

78
Q

The unauthorized copying or distribution of copyrighted software.

A

Software piracy

79
Q

The techniques or psychological tricks used to get people to comply with the perpetrator’s wishes in order to gain physical or logical access to a building, computer, server, or network. It is usually to get the information needed to obtain confidential data.

A

Social engineering

80
Q

Phishing except that texts are used to induce unsuspecting recipients to disclose personal information.

A

Smishing

81
Q

Software that secretly monitors computer usage, collects personal information about users, and sends it to someone else, often without the computer user’s permission.

A

Spyware

82
Q

Altering some part of an electronic communication to make it look as if someone else sent the communication in order to gain the trust of the recipient.

A

Spoofing

83
Q

Using short message service (SMS) to change the name or number a text message appears to come from.

A

SMS spoofing

84
Q

Sending an electronic message pretending to be a legitimate company, usually a financial institution, and requesting information or verification of information and often warning of a consequence if it is not provided. The request is bogus, and the information gathered is used to commit identity theft or to steal funds from the victim’s account.

A

Web-page spoofing

85
Q

Simultaneously sending the same unsolicited message to many people, often in an attempt to sell them something.

A

Spamming

86
Q

A program that lies idle until some specified circumstance or a particular time triggers it. Once triggered, the program sabotages the system by destroying programs or data.

A

Time bomb/logic bomb

87
Q

A set of computer instructions that allows a user to bypass the system’s normal controls.

A

Trap door/back door

88
Q

A set of unauthorized computer instructions in an authorized and otherwise properly functioning program.

A

Trojan horse

89
Q

Software that destroys competing malware. This sometimes results in “malware warfare” between competing malware developers.

A

Torpedo software

90
Q

Voice phishing; it is like phishing except the victim enters confidential data by phone.

A

Vishing

91
Q

Programming a computer to dial thousands of phone lines searching for dialup modem lines. Hackers hack into the PC attached to the modem and access the network to which it is connected.

A

War dialing

92
Q

Driving around looking for unprotected home or corporate wireless networks.

A

War driving

93
Q

Similar to a virus, except that it is a program rather than a code segment hidden in a host program.

  • also copies itself automatically and actively transmits itself directly to other systems.
A

Worm