Chapter 11 Flashcards
Inappropriate use of computer technology and resources
Computer waste
4 categories of computer crime
- Undelivered merchandise or nonpayment
- Identity theft
- Credit card fraud
- Auction fraud
Using social skills to get computer users to provide information to access an information system
Social engineering
Going through trash cans / decommissioned storage devices to find secret or confidential information
Dumpster diving
Learns about and uses computer systems
Hacker
Gains unauthorized use or illegal access to computer systems
Criminal hacker
Automates the job of crackers
Script bunny
Employee who comprises(made out of) corporate systems
Insider
A type of malware that spreads copies of itself from computer to computer
Computer worm
Malicious program that disguises itself as a useful application or game and purposefully does something the user does not expect
Trojan horse
Program file capable of attaching to disks or other files and replicating itself repeatedly
Virus
Set of programs that enable its user to gain administrator level access to a computer or network
Rootkit
Type of Trojan horse that executes when specific conditions occur
Logic bomb
Small program hidden in a network that records identification numbers and passwords
Password sniffer
Act of unauthorized copying or distribution of copyrighted software
Penalties can be severe
Software piracy