Chapter 9 - Computer Fraud and Abuse Techniques Flashcards

1
Q

What is adware?

A

Spyware that causes banner ads to pop up on a monitor, collects information about the user’s web-surfing and spending habits, and forwards it to the the adware creator, often an advertising or media organization. Adware usually comes bundled with freeware and shareware downloaded from the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is bluesnarfing?

A

Stealing contact lists, images, and other data using flaws in Bluetooth applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a botnet?

A

A network of powerful and dangerous hijacked computers that are used to attack systems or spread malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a bot herder?

A

The person who creates botnets by installing software on PCs that responds the the bot herder’s electronic instructions. This control over the PCs allows the bot herder to mount a variety of Internet attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a buffer overflow attack?

A

When the amount of data entered into a program is greater than the amount of the input buffer. The input overflow overwrites the next computer instruction, causing the system to crash. Hackers exploit this by crafting the input so that the overflow contains code that tells the computer what to do next. This code could open a back door into the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is chipping?

A

Planting a small chip that records transaction data in a legitimate credit card reader. The chip is later removed or electronically accessed to retrieve the data recorded on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is click fraud?

A

Manipulating the number of times an ad is clicked on to inflate advertising bills.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is cross-site scripting?

A

(XSS) A vulnerability in dynamic web pages that allows an attacker to bypass a browser’s security mechanisms and instruct the victim’s browser to execute code, thinking it came from the desired website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is cyber-extortion?

A

Threatening to harm a company or person if a specified amount of money is not paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a denial of service attack?

A

A computer attack in which the attacker sends so many email bombs or web page requests, often from randomly generated false addresses, that the Internet service provider’s email server or the web server is overloaded and shuts down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is email spoofing?

A

making a sender address and other parts of an email header appear as though the email originated from a different source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an evil twin?

A

A wireless network with the same name as a legitimate wireless point. Users are connected to the twin because it has a stronger wireless signal or the twin disrupts and disables the legitimate access point. Users are unaware that they connect to the evil twin and the perpetrator monitors traffic looking for confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is internet pump-and-dump fraud?

A

Using the internet to pump of the price of a stock and then sell it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is identity theft?

A

Assuming someone’s identity, usually for economic gain, by illegally obtaining confidential information such as a Social Security number or a bank account or credit card number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is IP address spoofing?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a keylogger?

A

Software the records computer activity, such as a user’s keystrokes, emails sent and received, and websites visited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is lebanese looping?

A

Inserting a sleeve into an ATM that prevents it from ejecting the card. The perpetrator pretends to help the victim, tricking the person into entering the PIN again. Once the victim gives up, the thief removes the card and uses it and the PIN to withdraw money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is malware?

A

Any software used to do harm.

19
Q

What are packet sniffers?

A

Programs that capture data from information packets as they travel over the Internet of company networks. Captured data is sifted to find confidential or proprietary information.

20
Q

What is password cracking?

A

Recovering passwords by trying every possible combination of upper and lower case letters, numbers, and special characters and comparing them to a cryptographic hash of the password.

21
Q

What is pharming?

A

Redirecting a user’s traffic to a spoofed website.

22
Q

What is phreaking?

A

Attacking phone systems to obtain free phone line access; use phone lines to transmit malware; and to access, steal and destroy data.

23
Q

What is phishing?

A

Sending an electronic message pretending to be a legitimate company, usually a financial institution, and requesting information or verification of information and warning of a consequence if it is not provided.

24
Q

What is piggybacking?

A
  1. The clandestine use of a neighbor’s wifi.
  2. Tapping into a communications line and electronically latching onto a legitimate user who carries the perpetrator into the system.
  3. An unauthorized person following an authorized person through a secure door.
25
Q

What is podslurping?

A

Using a small device with storage capacity to download unauthorized data from a computer.

26
Q

What is posing?

A

Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the product.

27
Q

What is ransomware?

A

Software that encrypts programs and data until a ransom is paid to remove it.

28
Q

What is a rootkit?

A

A means of concealing system components and malware from the operating system and other programs; can also modify the operating system.

29
Q

What is round-down fraud?

A

Instructing the computer to round down all interest calculations to two decimal places. The fraction of a cent rounded down on each calculation is put into the programmer’s account. Most frequently found in financial institutions that pay interest.

30
Q

What is the salami technique?

A

Stealing tiny slicer of money from many different accounts.

31
Q

What is skimming?

A

Double-swiping a credit card in a legitimate terminal or covertly swiping a credit card in a small, hidden, handheld card reader that record credit card data for later use.

32
Q

What is SMS spoofing?

A

Using short message service (SMS) to change the name of number a text message appears to come from.

33
Q

What is social engineering?

A

The techniques or psychological tricks used to get people to comply with the perpetrator’s wishes in order to gain physical or logical access to a building, computer, server, or network.

34
Q

What is software piracy?

A

The unauthorized copying or distribution of copyrighted software.

35
Q

What is steganography?

A

A program that can merge confidential information with a seemingly harmless file, password protect the file, and send it anywhere in the world, where the file is unlocked and the confidential information is reassembled.

36
Q

What is an SQL injection attack?

A

Inserting a malicious SQL query in input in such that it is passed to and executed by an application program. This allows a hacker to convince the application to run SQL code that it was not intended to execute.

37
Q

What is a time/logic bomb?

A

A program that lies idle until some specified circumstance or a particular time triggers it. Once triggered, the program sabotages the system by destroying programs or data.

38
Q

What is a trap door?

A

A set of computer instructions that allows a user to bypass the system’s normal controls.

39
Q

What is a trojan horse?

A

A set of unauthorized computer instructions in an authorized and otherwise properly functioning program.

40
Q

What is typosquatting?

A

Setting up a similarly named website so that users making typographical errors when entering a website name are sent to an invalid site.

41
Q

What is a virus?

A

A segment of executable code that attaches itself to a file, program, or some other executable system component. When the hidden program is triggered, it makes unauthorized alterations to the way a system operates.

42
Q

What is war driving?

A

Driving around looking for unprotected home or corporate wireless networks.

43
Q

What is a worm?

A

A self-replicating computer program, similar to a vires, except that it is a program rather than a code segment, and it automatically copies itself to other systems.

44
Q

What is a zero-day attack?

A

An attack between the time a new software vulnerability is discovered and “released into the wild” and the time a software developer releases a patch to fix the problem.