C9 COMPUTER FRAUD Flashcards

1
Q

**COMPUTER FRAUD **

A

direct computer attack
6 steps: CASREC
1. conduct reconaissance
2. attempt social-engineering
3. scan & map target
4. research
5. execute attack
6. cover the track

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HACKING ?

A

unathorized access, modify/ use of electronic device/ some element of computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HIJACKING ?

A

gain control someone else computer to carryout illicit activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DENIAL OF SERVICE (DOS) ?

A

web server overloaded & shuts down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BRUTE FORCE ATTACK ?

A

try & error method that uses software to guess info > user ID, pass to gain access to system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PASS CRACKING ?

A

recover pass by try & error every possible combo/ try every possible combo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DICTIONARY ATTACK ?

A

software that generate user ID & pass guesses using dictionary possible user ID & pass ( guess user ID & pass)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SPAMMING ?

A

simultaneously sending the same unsolicited message to many people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SPOOFING ?

A

alter some part of electronic communication to make it look as if someone else the communication in order to gain trust of recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MASQUERADING / IMPERSONATION ?

A

gain access to system by pretending to be authorized user. this requires the petrator know the legal user ID & pass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PIGGYBACKING ?

A
  1. using neighbour wifi network
  2. an unauthorized person follow authorized person through secure door, bypassing physical security control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PHREAKING ?

A

attack phone system to obtain free phone line access (telephone lines)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SALAMI TECHNIQUE

A

steal tiny slices of money from many different accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

INTERNET PUMP-AND-DUMP

A

use the internet to pump up the price of stock & then sell it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SOCIAL ENGINEERING

A

technique used to obtain confidential info - trick people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IDENTITY THEFT ?

A

assume someone else identity for economic gain by illegal obtaining confidential information

17
Q

PRETEXTING ?

A

use invented scenario that create legal in the target mind’s

18
Q

POSING ?

A

create buss that seem legal, collect personal info while making a sale & never deliver the product

19
Q

PHISHING ?

A

send electronic message pretend to be legal company, request info/verify & often warning of it consequence if it is not provided

20
Q

VISHING ?

A

voice phishing, enters confidential data by phone

21
Q

TYPOSQUATTING / URL HIJACKING

A

set up similarly named website so that users making typographical errors when enter website name & sent to invalid site

22
Q

SCAVENGING / DUMPSTER DIVING ?

A

search doc & records to gain access confidential info. this include searching garbage cans, communal trash bin & city dumps ( physical )

23
Q

**MALWARE **

A

any software that is used to do harm

24
Q

SPYWARE

A

software that secretly monitor computer usage, collect personal info users & send to someone else & wthout company user’s permission

25
Q

ADWARE

A

banner ads to pop up on monitor, collect info about user’s web-surfing & spending habits

26
Q

CYBER-EXTRORTION ATTACK

A

threat to harm company person if a specified amount money is paid

27
Q

KEYLOGGER

A

software that records computer activity

28
Q

VIRUS

A

self replicating, executable codes that attaches itself to a file/ program ( a segment that attaches to file, program/… )

29
Q

WORM

A

similar to virus but it is stand-alone program ( replicates itself from one machine to another, target whole network rather than specific files on individual computers )

30
Q

BLUESNARFING

A

stealing ( snarfing) in Bluetooth app

31
Q

BLUEBUGGING

A

take control of someone else’s phone