Chapter 5- Computer Fraud and Abuse

Business AIS

41 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
Adware
Using software to collect web surfing and spending data and forward it to ad or media orgs. (banner ads to pop up)
Click fraud
Clicking online ads numerous times to inflate ad bills
Hijacking
Gaining control of someone else's computer to carry out illicit activities without the owner's knowledge
Key logger
Using spyware to record a users keystrokes
Phishing
Sending e-mails requesting recipients to visit a web page and verify data or fill in missing data (emails and sites look real)
Spyware
Using software to monitor computing habits and send that data to someone else, often without the computer user's permission
Spoofing
Making an email message look as if someone else sent it
Eavesdropping
Listening to private voice or data transmissions (wiretap)
Packet sniffing
Using a computer to find confidential info as it travels the internet and other networks
Piggybacking
1. clandestine use of someone's WIFI network2.tapping into a telecomm line, latching on to a legitimate user, and accompanying the perpetrator into the system3. by passing physical security controls by entering a secure door when an authorized person opens it.
War dialing
Dialing thousands of phone lines searching for idle modems that can be used to enter the system capture the attached computer and gain access to the networks to which it is attached.
Data diddling
Changing data before, during or after they are entered into the system
Data leakage
Copying company data, such as computer files without permission
Identity theft
Assuming someone's identity usually for economic gain by illegally obtain in confidential info such as a social security #
Round-down
Truncating interest calculations at two decimal places. the truncated fraction of a cent is placed in an account controlled by the perpetrator