Ch 6: Computer Fraud and Abuse Techniques

Ace your homework & exams now with Quizwiz!

virus

A segment of executable code that attaches itself to a file, program, or some other executable system component. When the hidden program is triggered, it makes unauthorized alterations to the way a system operates

Lebanese looping

Inserting a sleeve into an ATM that prevents it from ejecting the card. The perpetrator pretends to help the victim, tricking the person into entering the PIN again. Once the victim gives up, the thief removes the card and uses it and the PIN to withdraw money.

phishing

Sending an electronic message pretending to be a legitimate company, usually a financial institution, and requesting information or verification of information and often warning of a consequence if it is not provided. The request is bogus, and the information gathered is used to commit identity theft or to steal funds from the victim's account.

Which of the following is a method that is used for identity theft?

Shoulder surfing, phishing, and dumpster diving.

worm

Similar to a virus, except that it is a program rather than a code segment hidden in a host program. A worm also copies itself automatically and actively transmits itself directly to other systems.

social engineering

The techniques or psychological tricks used to get people to comply with the perpetrator's wishes in order to gain physical or logical access to a building, computer, server, or network. It is usually to get the information needed to obtain confidential data.

Time bombs are most likely planted in an information system by:

disgruntled computer programmers

Spyware infections came from:

drive-by downloads file-sharing programs worms/viruses

Someone redirects a website's traffic to a bogus website, usually to gain access to personal and confidential information. What is this computer fraud technique called?

pharming

A computer crime that involves attacking phone lines is

phreaking

A perpetrator attacks phone systems to obtain free phone lines access or uses telephone lines to transmit viruses and to access, steal, and destroy data. What is this computer fraud technique called?

phreaking

hacking

unauthorized access, modification, or use of an electronic device or some element of a computer system

Hackers use all of the techniques except

war walking

piggybacking

1) Tapping into a communications line and electronically latching onto a legitimate user who unknowingly carries the perpetrator into the system 2) The clandestine use of a neighbor's WiFi network 3) Unauthorized person following an authorized person through a secure door, bypassing physical security controls

denial of service (DoS)

A network of powerful and dangerous hijacked computers that are used to attack systems or spread malware

zero-day attack

An attack between the time a new software vulnerability is discovered and "released it into the wild" and the time a software developer releases a patch to fix the problem

Which of the following is known as a zero-day attack?

An attack between the time a new software vulnerability is discovered and the time a patch for fixing the problem is released

password cracking

An intruder penetrates a system's defenses, steals the file of valid passwords, decrypts them, and then uses them to gain access to programs, files, and data (system resources)

A network of computers used in a denial-of-service (DoS) attack is called a (an):

Botnet

rootkit

Concealing system components and malware from the operating system and other programs; can also modify the operating system

A computer fraud and abuse technique that steals information, trade secrets, and intellectual property

Economic espionage

A rootkit captures data from packets that travel across networks

False

Internet pump-and-dump inflates advertising bills by manipulating click numbers on websties

False

war dialing

Programming a computer to dial thousands of phone lines searching for dial-up modem lines. Hackers hack into the PC attached to the modem and access the network to which it is connected.

pharming

Redirecting website traffic to a spoofed website

dumpster diving or scavenging

Searching documents and records to gain access to confidential information. Scavenging methods include searching garbage cans, communal trash bins, and city dumps

Which of the following is NOT a method that is used for identity theft?

Spamming

bluesnarfing

Stealing (snarfing) contact lists, images, and other data using flaws in Bluetooth applications.

Which of the following is not a characteristic of computer viruses?

They are easy to detect and destroy

Which of the following is a characteristic of computer viruses?

They can mutate which increases their ability to do damage, can hinder system performance, and can lie dormant for a time w/o doing damage

data diddling

changing data before or during entry into a computer system in order to delete, alter, add, or incorrectly update key system data

war driving

driving around looking for unprotected home or corporate wireless networks

Social engineering facilitates what type of computer fraud?

identity theft

The computer crime of piggybacking

involves the clandestine use of another user's WIFI

What type of software conceals processes, files, network connections, memory addresses, systems utility programs, and system data from the operating system and other programs?

rootkit

Which of the following is a method used to embezzle money a small amount at a time from many different accounts?

salami technique

tabnapping

secretly changing an already open browser tab in order to capture user IDs and passwords when the victim logs back into the site

spamming

simultaneously sending the same unsolicited message to many people, often in an attempt to sell them something

Techniques used to obtain confidential info, by tricking people, are referred to what?

social engineering

splog

spam blogs created to increase a website's Google PageRank, which is how often a web page is referenced by other web pages

salami technique

stealing tiny slices of money from many different accounts

Which computer fraud technique involves a set of instructions hidden inside a calendar utility that copies itself each time the utility is enabled until memory is filled and the system crashes?

virus

shoulder surfing

when perpetrators look over a person's shoulders in a public place to get information such as ATM PIN numbers or user IDs and passwords

Which type of computer attack takes place between the time a software vulnerability is discovered and the time software developers release a software patch that fixes the problem?

zero day attack

botnet

a network of powerful and dangerous hijacked computers that are used to attack systems or spread malware

Trojan horse

a set of unauthorized computer instructions in an authorized and otherwise properly functioning program

spoofing

altering some part of an electronic communication to make it look as if someone else sent the communication in order to gain the trust of the recipient

phreaking

attacking phone systems to get free phone access; using phone lines to transmit viruses and to access, steal and destroy data

A set of instructions to increase a programmer's pay rate by 10% is hidden inside an authorized program. It changes and updates the payroll file. What is this computer fraud technique called?

Trojan Horse

"Hacking" is an external attack on an accounting information system.

True

Bluesnarfing is the act of stealing contact lists, images, and other data using Bluetooth.

True

Pretexting is a technique employed in Social Engineering schemes

True

data slurping aka leakage

Unauthorized copying of company data, w/o leaving any indication that it was copied

pretexting

Using an invented scenario (the pretext) that creates legitimacy in the target's mind in order to increase the likelihood that a victim will divulge information or do something.


Related study sets

LearningCurve: 8f. The Relationship Between Attitudes and Behavior

View Set

Modules 4 - 7: Ethernet Concepts Exam

View Set