Computer and Internet Fraud Flashcards

1
Q

Social engineering

A

attacker deceives victim into disclosing personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phising

A

providing sensitive information by claiming to be actual business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Example of Phising

A

Business Email compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SMSishing

A

text messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pharming

A

Fraudulent website that imitates legitimate website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Password cracking

A

guess system user password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of malware

A
  1. Viruses
  2. Worms
  3. Trojans
  4. Spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Worms

A

self-replicating computer programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trojan Horse

A

appearance as useful but contains malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information Security Goals (1-3)

A
  1. Confidentiality
  2. Integrity
  3. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information Security Goals (4-5)

A
  1. Authentication
  2. Non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are logical access controls

A

Process by which users are identified and granted certain privileges to information, systems or resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly