Chapter 5 IT Quiz

Ace your homework & exams now with Quizwiz!

Output Fraud

Stealing, copying, or misusing computer printouts or displayed information.

Processor Fraud

Unauthorized system use Computer.

Computer Fraud

Any illegal act in which knowledge of computer technology is necessary for:PerpetrationInvestigationProsecution.

Exploit Kits

A vulnerability means some problem in the coding of a software that enables cyber criminals to gain control of your computer. There are ready to use tools in the Internet market which people can buy and use it against you. These exploit kits are upgraded just like normal software. Only difference is these are illegal. They are available mostly in hacking forums as well as on the Darknet.

Input Fraud

Alteration or falsifying input.

Opportunity

Condition or situation that allows a person or organization to:Commit the fraud.Conceal the fraud, Convert the theft or misrepresentation to personal gain.

Fraud

Gaining an unfair advantage over another person.

Data Fraud

Illegally using, copying, browsing, searching, or harming company data.

Rationalization

Justification of illegal behavior

Instructions Fraud

Modifying software, illegal copying of software, using software in an unauthorized manner, creating software to undergo unauthorized activities.

Pressure

Motivation or incentive to commit fraud.

Scams

Notable among Internet scams are, scams which misuse the Microsoft name and other general tech support scams. Scamsters phone computer users randomly and offer to fix their computer for a fee. Every single day, scores of innocent people are trapped by scam artists into Online Tech Support Scams and forced to shell out hundreds of dollars for non-existent computer problems.

Ransom Software

This is one of the detestable malware-based attacks. It enters your computer network and encrypts your files using public-key encryption, and unlike other malware this encryption key remains on the hacker's server. Attacked users are then asked to pay huge ransoms to receive this private key.

Botnets

are networks of compromised computers, controlled by remote attackers in order to perform such illicit tasks as sending spam or attacking other computers. Computer Bots can also be used act like malware and carry out malicious tasks. Then can be used to assemble a network of computers and then compromise them.

Remote Administration Tools

are used to carry out illegal activities. It can be used to control the computer using shell commands, steal files/data, send location of the computer to a remote controlling device and more.

DDoS attacks

are used to make an online service unavailable and bring it down, by bombarding or overwhelming it with traffic from multiple locations and sources. Large networks of infected computers, called Botnets are developed by planting malware on the victim computers. The idea is normally to draw attention to it, and allow the hacker to hack into a system. Extortion and blackmail could be the other motivations.

PUPs

commonly known as Potentially Unwanted Programs are less harmful but more annoying malware. It installs unwanted software in your system including search agents and toolbars. They include spyware, adware, as well as dialers.

Fraudulent financial reporting

intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements.

Phishing

is a method where cyber criminals offer a bait so that you take it and give out the information they want. The bait can be in form of a business proposal, announcement of a lottery to which you never subscribed, and anything that promises you money for nothing or a small favor. There are online loans companies too, making claims that you can get insecure loans irrespective of your location. Doing business with such claims, you are sure to suffer both financially and mentally.

Social engineering

is a method where the cyber criminals make a direct contact with you using emails or phones - mostly the latter. They try to gain your confidence and once they succeed at it, they get the information they need. This information can be about you, your money, your company where you work or anything that can be of interest to the cyber criminals. It is easy to find out basic information about people from the Internet. Using this information as the base, the cyber criminals try to befriend you and once they succeed, they will disappear, leaving you prone to different financial injuries directly and indirectly. They can sell the information obtained by you or use it to secure things like loans in your name. The latter case is of Identity theft. You should be very careful when dealing with strangers - both on phone and on the Internet.

Malvertising

is a method whereby users download malicious code by simply clicking at some advertisement on any website that is infected. In most cases, the websites are innocent. It is the cyber criminals who insert malicious advertisements on the websites without the knowledge of the latter. It is the work of advert companies to check out if an advertisement is malicious but given the number of advertisements they have to deal with, the malverts easily pass off as genuine ads.

Spam

is basically unwanted emails and messages. They use Spambots.

Identity Theft

is used, when a person purports to be some other person, with a view to creating a fraud for financial gains. When this is done online on the Internet, its is called Online Identity Theft. The most common source to steal identity information of others, are data breaches affecting government or federal websites. It can be data breaches of private websites too, that contain important information such as - credit card information, address, email ID's, etc.

Drive By Downloads

too, come close to malvertising. You visit a website and it triggers a download of malicious code to your computer. These computers are then used to aggregate data and to manipulate other computers as well. The websites may or may not know that they have been compromised. Mostly, the cyber criminals use vulnerable software such as Java and Adobe Flash and Microsoft Silverlight to inject malicious codes as soon as a browser visits the infected website. The user does not even know that there is a download in progress.


Related study sets

NUR 424 final ch. 15 and 34 prepu questions

View Set

SCM421 Test2 quick check questions

View Set

Identify the functions of Integumentary System Terms

View Set

Preguntas de colores // Color questions

View Set

Chapter 12 - Production & Growth

View Set

Anatomy Chapter 7 Summary Questions

View Set

GEOM A, U4L3: Proving Lines Parallel QUIZ

View Set