Chapter 9 - Computer Fraud and Abuse Techniques Flashcards
(44 cards)
What is adware?
Spyware that causes banner ads to pop up on a monitor, collects information about the user’s web-surfing and spending habits, and forwards it to the the adware creator, often an advertising or media organization. Adware usually comes bundled with freeware and shareware downloaded from the internet.
What is bluesnarfing?
Stealing contact lists, images, and other data using flaws in Bluetooth applications.
What is a botnet?
A network of powerful and dangerous hijacked computers that are used to attack systems or spread malware.
What is a bot herder?
The person who creates botnets by installing software on PCs that responds the the bot herder’s electronic instructions. This control over the PCs allows the bot herder to mount a variety of Internet attacks.
What is a buffer overflow attack?
When the amount of data entered into a program is greater than the amount of the input buffer. The input overflow overwrites the next computer instruction, causing the system to crash. Hackers exploit this by crafting the input so that the overflow contains code that tells the computer what to do next. This code could open a back door into the system.
What is chipping?
Planting a small chip that records transaction data in a legitimate credit card reader. The chip is later removed or electronically accessed to retrieve the data recorded on it.
What is click fraud?
Manipulating the number of times an ad is clicked on to inflate advertising bills.
What is cross-site scripting?
(XSS) A vulnerability in dynamic web pages that allows an attacker to bypass a browser’s security mechanisms and instruct the victim’s browser to execute code, thinking it came from the desired website.
What is cyber-extortion?
Threatening to harm a company or person if a specified amount of money is not paid.
What is a denial of service attack?
A computer attack in which the attacker sends so many email bombs or web page requests, often from randomly generated false addresses, that the Internet service provider’s email server or the web server is overloaded and shuts down.
What is email spoofing?
making a sender address and other parts of an email header appear as though the email originated from a different source.
What is an evil twin?
A wireless network with the same name as a legitimate wireless point. Users are connected to the twin because it has a stronger wireless signal or the twin disrupts and disables the legitimate access point. Users are unaware that they connect to the evil twin and the perpetrator monitors traffic looking for confidential information.
What is internet pump-and-dump fraud?
Using the internet to pump of the price of a stock and then sell it.
What is identity theft?
Assuming someone’s identity, usually for economic gain, by illegally obtaining confidential information such as a Social Security number or a bank account or credit card number.
What is IP address spoofing?
What is a keylogger?
Software the records computer activity, such as a user’s keystrokes, emails sent and received, and websites visited.
What is lebanese looping?
Inserting a sleeve into an ATM that prevents it from ejecting the card. The perpetrator pretends to help the victim, tricking the person into entering the PIN again. Once the victim gives up, the thief removes the card and uses it and the PIN to withdraw money.
What is malware?
Any software used to do harm.
What are packet sniffers?
Programs that capture data from information packets as they travel over the Internet of company networks. Captured data is sifted to find confidential or proprietary information.
What is password cracking?
Recovering passwords by trying every possible combination of upper and lower case letters, numbers, and special characters and comparing them to a cryptographic hash of the password.
What is pharming?
Redirecting a user’s traffic to a spoofed website.
What is phreaking?
Attacking phone systems to obtain free phone line access; use phone lines to transmit malware; and to access, steal and destroy data.
What is phishing?
Sending an electronic message pretending to be a legitimate company, usually a financial institution, and requesting information or verification of information and warning of a consequence if it is not provided.
What is piggybacking?
- The clandestine use of a neighbor’s wifi.
- Tapping into a communications line and electronically latching onto a legitimate user who carries the perpetrator into the system.
- An unauthorized person following an authorized person through a secure door.