Chapter 6 Flashcards
Consists of the unauthorized copying of company data
Data leakage
Individuals who’s use telephone lines to commit fraud and other illegal acts are typically called
Phreakers
occurs when the perpetrator sends hundreds of messages from randomly generated false addresses, overloading an Internet service provider’s email
Denial of service attack
gaining control of somebody’s computer without their knowledge and using it to carry out illicit activities is know as
hijacking
tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called
piggybacking
What is not a method of identity theft
phreaking
the deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called
masquerading
the unauthorized access to, or use of a computer system is know as
hacking
a fraud technique that slices off tiny amounts from many projects is called what technique
salami
data diddling is
changing the data before, during, or after it is entered into the system in order to delete, alter, or add key system data
in the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls. The people who use these methods are referred to as
phreakers
during a routine audit, a review of cash receipts and related accounting entries revealed discrepancies. Upon further analysis, it was found that figures had been entered correctly and then subsequently changed, with the difference diverted to a fictitious customer account. This is an example of
data diddling
LOLer was chatting online with 133er. “I can’t believe how lame people are! :) I can get into any system by checking out the company website to see how user names are defined and who is on the employee directory. Then, all it takes is brute force to find the password.” LOLer is a _____ and the fraud he is describing is ______
hacker; password cracking
after graduating from college with a communications degree, Rado Ionesco experienced some difficulty in finding full time employment. He free lanced during the summer as a writer and then started a blog in the fall. Shortly thereafter he was contacted by SitePromoter Incorporated, who offered to pay him to promote their clients in his blog. He set up several more blogs for hti purpose and is now generating a reasonable level of income. This is
splogging
computers that are part of a botnet and are controlled by a bot herder are referred to as
zombies
describe six computer attacks and abuse techniques.
- hacking
- war dialing
- data leakage
- spamming
- email threats
- salami technique
unauthorized access and use of a computer system
hacking
searching for an idle modem by dialing thousands of telephones and intruding systems through idle modems
war dialing
unauthorized copying of data files
data leakage
emailing the same message to everyone on one or more Usenet groups
spamming
threatening legal action and asking for money via email
email threats
small amounts sliced off and stolen from many projects over a period of time
salami technique
Zeus is and example of
a trojan horse
a set of unauthorized computer instructions in an authorized and otherwise properly functioning program
Trojan horse
Recall that students used Facebook and Vkontakte to identify Russian money laundering mules. What fraud case was this
Trident Breach
On the weekends Luis likes to get in his car and drive around the city searching for unprotected wireless networks to exploit. This is
war driving
offering a free website, then charging the phone bills of the individuals who signed up for the free website is known as
web cramming
social engineering takes advantage of these 7 human traits in order to entice a person to reveal information
- Compassion-desire to help others who need help
- Greed- think get something for free, for themselves
- Sex Appeal
- Sloth- people want the easy way to do things
- Trust
- Urgency- sense of immediate need
- Vanity- boost popularity
Jim Chan was Christmas shopping, linked to Amazon.com and found the perfect gift for his daughter. Later he noticed the URL was actually Amazom.com. He was a victim of
typosquatting
describe at least 4 social engineering techniques
- Phishing
- Vishing
- Typosquatting
- Pharming
sending email pretending to be a legitimate business colleague, requesting user ID or password or other confidential data
phishing
pretending to be a legitimate business colleague and attempting to get a victim to provide confidential information over the phone
vishing
setting up websites with names similar to real websites
typosquatting
redirecting website traffic to a spoofed website
pharming
pretexting is best described as a social engineering technique that uses
an invented scenario to gain sensitive information
inserting a sleeve into an ATM so hat it will not eject the victim’s card, pretending to help the victim as a means of obtaining his PIN, ad using th card and PIN to drain the account
Lebanese looping
list 4 types of malware
- spyware
- torpedo software
- scareware
- keylogger
a part of a program that remains idle until a specified date or event activates it to cause havoc is called a
logic bomb
spyware is
software that monitors computing habits and sends the data it gathers to someone else
torpedo software is
software that destroys competing malware
scareware is
malicious software of no benefit that is sold using scare tactics
keylogger is
using spyware to record a user’s keystrokes
the unauthorized use of special program that bypass regular system controls to perform illegal acts is
superzapping
computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using
a trap door
A ____ is similar to a ____ except that it is a program rather than a code segment hidden in a host program
worm; virus
software that conceals processes, files, network connections, and system data from the operating system and other programs; can also change the operating system
rootkit
Which of the following would be the least effective way to reduce exposure to a computer virus
a. only transfer files between computers with a USB
b. Install and frequently update antivirus software
c. Install all new software on a stand alone computer for until it is tested
d. Do not open email attachments from unknown vendors
D.
ransomware usually comes in the form of
fake antivirus software