Front | Back |
Adware
|
Using software to collect web surfing and spending data and forward it to ad or media orgs. (banner ads to pop up)
|
Click fraud
|
Clicking online ads numerous times to inflate ad bills
|
Hijacking
|
Gaining control of someone else's computer to carry out illicit activities without the owner's knowledge
|
Key logger
|
Using spyware to record a users keystrokes
|
Phishing
|
Sending e-mails requesting recipients to visit a web page and verify data or fill in missing data (emails and sites look real)
|
Spyware
|
Using software to monitor computing habits and send that data to someone else, often without the computer user's permission
|
Spoofing
|
Making an email message look as if someone else sent it
|
Eavesdropping
|
Listening to private voice or data transmissions (wiretap)
|
Packet sniffing
|
Using a computer to find confidential info as it travels the internet and other networks
|
Piggybacking
|
1. clandestine use of someone's WIFI network2.tapping into a telecomm line, latching on to a legitimate user, and accompanying the perpetrator into the system3. by passing physical security controls by entering a secure door when an authorized person opens it.
|
War dialing
|
Dialing thousands of phone lines searching for idle modems that can be used to enter the system capture the attached computer and gain access to the networks to which it is attached.
|
Data diddling
|
Changing data before, during or after they are entered into the system
|
Data leakage
|
Copying company data, such as computer files without permission
|
Identity theft
|
Assuming someone's identity usually for economic gain by illegally obtain in confidential info such as a social security #
|
Round-down
|
Truncating interest calculations at two decimal places. the truncated fraction of a cent is placed in an account controlled by the perpetrator
|