Chapter 6 Flashcards
Consists of the unauthorized copying of company data
Data leakage
Individuals who’s use telephone lines to commit fraud and other illegal acts are typically called
Phreakers
occurs when the perpetrator sends hundreds of messages from randomly generated false addresses, overloading an Internet service provider’s email
Denial of service attack
gaining control of somebody’s computer without their knowledge and using it to carry out illicit activities is know as
hijacking
tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called
piggybacking
What is not a method of identity theft
phreaking
the deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called
masquerading
the unauthorized access to, or use of a computer system is know as
hacking
a fraud technique that slices off tiny amounts from many projects is called what technique
salami
data diddling is
changing the data before, during, or after it is entered into the system in order to delete, alter, or add key system data
in the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls. The people who use these methods are referred to as
phreakers
during a routine audit, a review of cash receipts and related accounting entries revealed discrepancies. Upon further analysis, it was found that figures had been entered correctly and then subsequently changed, with the difference diverted to a fictitious customer account. This is an example of
data diddling
LOLer was chatting online with 133er. “I can’t believe how lame people are! :) I can get into any system by checking out the company website to see how user names are defined and who is on the employee directory. Then, all it takes is brute force to find the password.” LOLer is a _____ and the fraud he is describing is ______
hacker; password cracking
after graduating from college with a communications degree, Rado Ionesco experienced some difficulty in finding full time employment. He free lanced during the summer as a writer and then started a blog in the fall. Shortly thereafter he was contacted by SitePromoter Incorporated, who offered to pay him to promote their clients in his blog. He set up several more blogs for hti purpose and is now generating a reasonable level of income. This is
splogging
computers that are part of a botnet and are controlled by a bot herder are referred to as
zombies
describe six computer attacks and abuse techniques.
- hacking
- war dialing
- data leakage
- spamming
- email threats
- salami technique
unauthorized access and use of a computer system
hacking
searching for an idle modem by dialing thousands of telephones and intruding systems through idle modems
war dialing
unauthorized copying of data files
data leakage