C9 COMPUTER FRAUD Flashcards
**COMPUTER FRAUD **
direct computer attack
6 steps: CASREC
1. conduct reconaissance
2. attempt social-engineering
3. scan & map target
4. research
5. execute attack
6. cover the track
HACKING ?
unathorized access, modify/ use of electronic device/ some element of computer system
HIJACKING ?
gain control someone else computer to carryout illicit activities
DENIAL OF SERVICE (DOS) ?
web server overloaded & shuts down
BRUTE FORCE ATTACK ?
try & error method that uses software to guess info > user ID, pass to gain access to system
PASS CRACKING ?
recover pass by try & error every possible combo/ try every possible combo
DICTIONARY ATTACK ?
software that generate user ID & pass guesses using dictionary possible user ID & pass ( guess user ID & pass)
SPAMMING ?
simultaneously sending the same unsolicited message to many people
SPOOFING ?
alter some part of electronic communication to make it look as if someone else the communication in order to gain trust of recipient
MASQUERADING / IMPERSONATION ?
gain access to system by pretending to be authorized user. this requires the petrator know the legal user ID & pass
PIGGYBACKING ?
- using neighbour wifi network
- an unauthorized person follow authorized person through secure door, bypassing physical security control
PHREAKING ?
attack phone system to obtain free phone line access (telephone lines)
SALAMI TECHNIQUE
steal tiny slices of money from many different accounts
INTERNET PUMP-AND-DUMP
use the internet to pump up the price of stock & then sell it
SOCIAL ENGINEERING
technique used to obtain confidential info - trick people