Chapter 6 Flashcards

1
Q

Consists of the unauthorized copying of company data

A

Data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Individuals who’s use telephone lines to commit fraud and other illegal acts are typically called

A

Phreakers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

occurs when the perpetrator sends hundreds of messages from randomly generated false addresses, overloading an Internet service provider’s email

A

Denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

gaining control of somebody’s computer without their knowledge and using it to carry out illicit activities is know as

A

hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called

A

piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is not a method of identity theft

A

phreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called

A

masquerading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the unauthorized access to, or use of a computer system is know as

A

hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a fraud technique that slices off tiny amounts from many projects is called what technique

A

salami

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data diddling is

A

changing the data before, during, or after it is entered into the system in order to delete, alter, or add key system data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

in the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls. The people who use these methods are referred to as

A

phreakers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

during a routine audit, a review of cash receipts and related accounting entries revealed discrepancies. Upon further analysis, it was found that figures had been entered correctly and then subsequently changed, with the difference diverted to a fictitious customer account. This is an example of

A

data diddling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

LOLer was chatting online with 133er. “I can’t believe how lame people are! :) I can get into any system by checking out the company website to see how user names are defined and who is on the employee directory. Then, all it takes is brute force to find the password.” LOLer is a _____ and the fraud he is describing is ______

A

hacker; password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

after graduating from college with a communications degree, Rado Ionesco experienced some difficulty in finding full time employment. He free lanced during the summer as a writer and then started a blog in the fall. Shortly thereafter he was contacted by SitePromoter Incorporated, who offered to pay him to promote their clients in his blog. He set up several more blogs for hti purpose and is now generating a reasonable level of income. This is

A

splogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

computers that are part of a botnet and are controlled by a bot herder are referred to as

A

zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

describe six computer attacks and abuse techniques.

A
  1. hacking
  2. war dialing
  3. data leakage
  4. spamming
  5. email threats
  6. salami technique
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

unauthorized access and use of a computer system

A

hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

searching for an idle modem by dialing thousands of telephones and intruding systems through idle modems

A

war dialing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

unauthorized copying of data files

A

data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

emailing the same message to everyone on one or more Usenet groups

A

spamming

21
Q

threatening legal action and asking for money via email

A

email threats

22
Q

small amounts sliced off and stolen from many projects over a period of time

A

salami technique

23
Q

Zeus is and example of

A

a trojan horse

24
Q

a set of unauthorized computer instructions in an authorized and otherwise properly functioning program

A

Trojan horse

25
Q

Recall that students used Facebook and Vkontakte to identify Russian money laundering mules. What fraud case was this

A

Trident Breach

26
Q

On the weekends Luis likes to get in his car and drive around the city searching for unprotected wireless networks to exploit. This is

A

war driving

27
Q

offering a free website, then charging the phone bills of the individuals who signed up for the free website is known as

A

web cramming

28
Q

social engineering takes advantage of these 7 human traits in order to entice a person to reveal information

A
  1. Compassion-desire to help others who need help
  2. Greed- think get something for free, for themselves
  3. Sex Appeal
  4. Sloth- people want the easy way to do things
  5. Trust
  6. Urgency- sense of immediate need
  7. Vanity- boost popularity
29
Q

Jim Chan was Christmas shopping, linked to Amazon.com and found the perfect gift for his daughter. Later he noticed the URL was actually Amazom.com. He was a victim of

A

typosquatting

30
Q

describe at least 4 social engineering techniques

A
  1. Phishing
  2. Vishing
  3. Typosquatting
  4. Pharming
31
Q

sending email pretending to be a legitimate business colleague, requesting user ID or password or other confidential data

A

phishing

32
Q

pretending to be a legitimate business colleague and attempting to get a victim to provide confidential information over the phone

A

vishing

33
Q

setting up websites with names similar to real websites

A

typosquatting

34
Q

redirecting website traffic to a spoofed website

A

pharming

35
Q

pretexting is best described as a social engineering technique that uses

A

an invented scenario to gain sensitive information

36
Q

inserting a sleeve into an ATM so hat it will not eject the victim’s card, pretending to help the victim as a means of obtaining his PIN, ad using th card and PIN to drain the account

A

Lebanese looping

37
Q

list 4 types of malware

A
  1. spyware
  2. torpedo software
  3. scareware
  4. keylogger
38
Q

a part of a program that remains idle until a specified date or event activates it to cause havoc is called a

A

logic bomb

39
Q

spyware is

A

software that monitors computing habits and sends the data it gathers to someone else

40
Q

torpedo software is

A

software that destroys competing malware

41
Q

scareware is

A

malicious software of no benefit that is sold using scare tactics

42
Q

keylogger is

A

using spyware to record a user’s keystrokes

43
Q

the unauthorized use of special program that bypass regular system controls to perform illegal acts is

A

superzapping

44
Q

computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using

A

a trap door

45
Q

A ____ is similar to a ____ except that it is a program rather than a code segment hidden in a host program

A

worm; virus

46
Q

software that conceals processes, files, network connections, and system data from the operating system and other programs; can also change the operating system

A

rootkit

47
Q

Which of the following would be the least effective way to reduce exposure to a computer virus

A

a. only transfer files between computers with a USB
b. Install and frequently update antivirus software
c. Install all new software on a stand alone computer for until it is tested
d. Do not open email attachments from unknown vendors

D.

48
Q

ransomware usually comes in the form of

A

fake antivirus software