Chapter 9 - Computer Fraud and Abuse Techniques Flashcards
What is adware?
Spyware that causes banner ads to pop up on a monitor, collects information about the user’s web-surfing and spending habits, and forwards it to the the adware creator, often an advertising or media organization. Adware usually comes bundled with freeware and shareware downloaded from the internet.
What is bluesnarfing?
Stealing contact lists, images, and other data using flaws in Bluetooth applications.
What is a botnet?
A network of powerful and dangerous hijacked computers that are used to attack systems or spread malware.
What is a bot herder?
The person who creates botnets by installing software on PCs that responds the the bot herder’s electronic instructions. This control over the PCs allows the bot herder to mount a variety of Internet attacks.
What is a buffer overflow attack?
When the amount of data entered into a program is greater than the amount of the input buffer. The input overflow overwrites the next computer instruction, causing the system to crash. Hackers exploit this by crafting the input so that the overflow contains code that tells the computer what to do next. This code could open a back door into the system.
What is chipping?
Planting a small chip that records transaction data in a legitimate credit card reader. The chip is later removed or electronically accessed to retrieve the data recorded on it.
What is click fraud?
Manipulating the number of times an ad is clicked on to inflate advertising bills.
What is cross-site scripting?
(XSS) A vulnerability in dynamic web pages that allows an attacker to bypass a browser’s security mechanisms and instruct the victim’s browser to execute code, thinking it came from the desired website.
What is cyber-extortion?
Threatening to harm a company or person if a specified amount of money is not paid.
What is a denial of service attack?
A computer attack in which the attacker sends so many email bombs or web page requests, often from randomly generated false addresses, that the Internet service provider’s email server or the web server is overloaded and shuts down.
What is email spoofing?
making a sender address and other parts of an email header appear as though the email originated from a different source.
What is an evil twin?
A wireless network with the same name as a legitimate wireless point. Users are connected to the twin because it has a stronger wireless signal or the twin disrupts and disables the legitimate access point. Users are unaware that they connect to the evil twin and the perpetrator monitors traffic looking for confidential information.
What is internet pump-and-dump fraud?
Using the internet to pump of the price of a stock and then sell it.
What is identity theft?
Assuming someone’s identity, usually for economic gain, by illegally obtaining confidential information such as a Social Security number or a bank account or credit card number.
What is IP address spoofing?
What is a keylogger?
Software the records computer activity, such as a user’s keystrokes, emails sent and received, and websites visited.
What is lebanese looping?
Inserting a sleeve into an ATM that prevents it from ejecting the card. The perpetrator pretends to help the victim, tricking the person into entering the PIN again. Once the victim gives up, the thief removes the card and uses it and the PIN to withdraw money.