C9 COMPUTER FRAUD Flashcards
**COMPUTER FRAUD **
direct computer attack
6 steps: CASREC
1. conduct reconaissance
2. attempt social-engineering
3. scan & map target
4. research
5. execute attack
6. cover the track
HACKING ?
unathorized access, modify/ use of electronic device/ some element of computer system
HIJACKING ?
gain control someone else computer to carryout illicit activities
DENIAL OF SERVICE (DOS) ?
web server overloaded & shuts down
BRUTE FORCE ATTACK ?
try & error method that uses software to guess info > user ID, pass to gain access to system
PASS CRACKING ?
recover pass by try & error every possible combo/ try every possible combo
DICTIONARY ATTACK ?
software that generate user ID & pass guesses using dictionary possible user ID & pass ( guess user ID & pass)
SPAMMING ?
simultaneously sending the same unsolicited message to many people
SPOOFING ?
alter some part of electronic communication to make it look as if someone else the communication in order to gain trust of recipient
MASQUERADING / IMPERSONATION ?
gain access to system by pretending to be authorized user. this requires the petrator know the legal user ID & pass
PIGGYBACKING ?
- using neighbour wifi network
- an unauthorized person follow authorized person through secure door, bypassing physical security control
PHREAKING ?
attack phone system to obtain free phone line access (telephone lines)
SALAMI TECHNIQUE
steal tiny slices of money from many different accounts
INTERNET PUMP-AND-DUMP
use the internet to pump up the price of stock & then sell it
SOCIAL ENGINEERING
technique used to obtain confidential info - trick people
IDENTITY THEFT ?
assume someone else identity for economic gain by illegal obtaining confidential information
PRETEXTING ?
use invented scenario that create legal in the target mind’s
POSING ?
create buss that seem legal, collect personal info while making a sale & never deliver the product
PHISHING ?
send electronic message pretend to be legal company, request info/verify & often warning of it consequence if it is not provided
VISHING ?
voice phishing, enters confidential data by phone
TYPOSQUATTING / URL HIJACKING
set up similarly named website so that users making typographical errors when enter website name & sent to invalid site
SCAVENGING / DUMPSTER DIVING ?
search doc & records to gain access confidential info. this include searching garbage cans, communal trash bin & city dumps ( physical )
**MALWARE **
any software that is used to do harm
SPYWARE
software that secretly monitor computer usage, collect personal info users & send to someone else & wthout company user’s permission
ADWARE
banner ads to pop up on monitor, collect info about user’s web-surfing & spending habits
CYBER-EXTRORTION ATTACK
threat to harm company person if a specified amount money is paid
KEYLOGGER
software that records computer activity
VIRUS
self replicating, executable codes that attaches itself to a file/ program ( a segment that attaches to file, program/… )
WORM
similar to virus but it is stand-alone program ( replicates itself from one machine to another, target whole network rather than specific files on individual computers )
BLUESNARFING
stealing ( snarfing) in Bluetooth app
BLUEBUGGING
take control of someone else’s phone