Chapter 6 Flashcards

1
Q

Consists of the unauthorized copying of company data

A

Data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Individuals who’s use telephone lines to commit fraud and other illegal acts are typically called

A

Phreakers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

occurs when the perpetrator sends hundreds of messages from randomly generated false addresses, overloading an Internet service provider’s email

A

Denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

gaining control of somebody’s computer without their knowledge and using it to carry out illicit activities is know as

A

hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called

A

piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is not a method of identity theft

A

phreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called

A

masquerading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the unauthorized access to, or use of a computer system is know as

A

hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a fraud technique that slices off tiny amounts from many projects is called what technique

A

salami

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data diddling is

A

changing the data before, during, or after it is entered into the system in order to delete, alter, or add key system data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

in the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls. The people who use these methods are referred to as

A

phreakers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

during a routine audit, a review of cash receipts and related accounting entries revealed discrepancies. Upon further analysis, it was found that figures had been entered correctly and then subsequently changed, with the difference diverted to a fictitious customer account. This is an example of

A

data diddling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

LOLer was chatting online with 133er. “I can’t believe how lame people are! :) I can get into any system by checking out the company website to see how user names are defined and who is on the employee directory. Then, all it takes is brute force to find the password.” LOLer is a _____ and the fraud he is describing is ______

A

hacker; password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

after graduating from college with a communications degree, Rado Ionesco experienced some difficulty in finding full time employment. He free lanced during the summer as a writer and then started a blog in the fall. Shortly thereafter he was contacted by SitePromoter Incorporated, who offered to pay him to promote their clients in his blog. He set up several more blogs for hti purpose and is now generating a reasonable level of income. This is

A

splogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

computers that are part of a botnet and are controlled by a bot herder are referred to as

A

zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

describe six computer attacks and abuse techniques.

A
  1. hacking
  2. war dialing
  3. data leakage
  4. spamming
  5. email threats
  6. salami technique
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

unauthorized access and use of a computer system

A

hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

searching for an idle modem by dialing thousands of telephones and intruding systems through idle modems

A

war dialing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

unauthorized copying of data files

A

data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

emailing the same message to everyone on one or more Usenet groups

21
Q

threatening legal action and asking for money via email

A

email threats

22
Q

small amounts sliced off and stolen from many projects over a period of time

A

salami technique

23
Q

Zeus is and example of

A

a trojan horse

24
Q

a set of unauthorized computer instructions in an authorized and otherwise properly functioning program

A

Trojan horse

25
Recall that students used Facebook and Vkontakte to identify Russian money laundering mules. What fraud case was this
Trident Breach
26
On the weekends Luis likes to get in his car and drive around the city searching for unprotected wireless networks to exploit. This is
war driving
27
offering a free website, then charging the phone bills of the individuals who signed up for the free website is known as
web cramming
28
social engineering takes advantage of these 7 human traits in order to entice a person to reveal information
1. Compassion-desire to help others who need help 2. Greed- think get something for free, for themselves 3. Sex Appeal 4. Sloth- people want the easy way to do things 5. Trust 6. Urgency- sense of immediate need 7. Vanity- boost popularity
29
Jim Chan was Christmas shopping, linked to Amazon.com and found the perfect gift for his daughter. Later he noticed the URL was actually Amazom.com. He was a victim of
typosquatting
30
describe at least 4 social engineering techniques
1. Phishing 2. Vishing 3. Typosquatting 4. Pharming
31
sending email pretending to be a legitimate business colleague, requesting user ID or password or other confidential data
phishing
32
pretending to be a legitimate business colleague and attempting to get a victim to provide confidential information over the phone
vishing
33
setting up websites with names similar to real websites
typosquatting
34
redirecting website traffic to a spoofed website
pharming
35
pretexting is best described as a social engineering technique that uses
an invented scenario to gain sensitive information
36
inserting a sleeve into an ATM so hat it will not eject the victim's card, pretending to help the victim as a means of obtaining his PIN, ad using th card and PIN to drain the account
Lebanese looping
37
list 4 types of malware
1. spyware 2. torpedo software 3. scareware 4. keylogger
38
a part of a program that remains idle until a specified date or event activates it to cause havoc is called a
logic bomb
39
spyware is
software that monitors computing habits and sends the data it gathers to someone else
40
torpedo software is
software that destroys competing malware
41
scareware is
malicious software of no benefit that is sold using scare tactics
42
keylogger is
using spyware to record a user's keystrokes
43
the unauthorized use of special program that bypass regular system controls to perform illegal acts is
superzapping
44
computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using
a trap door
45
A ____ is similar to a ____ except that it is a program rather than a code segment hidden in a host program
worm; virus
46
software that conceals processes, files, network connections, and system data from the operating system and other programs; can also change the operating system
rootkit
47
Which of the following would be the least effective way to reduce exposure to a computer virus
a. only transfer files between computers with a USB b. Install and frequently update antivirus software c. Install all new software on a stand alone computer for until it is tested d. Do not open email attachments from unknown vendors D.
48
ransomware usually comes in the form of
fake antivirus software