• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
sabotage
intent to destroy or harm a system or some of its components
missappropriation of assets
employee fraud, theft of company assets
fraud triangle
opportunity, rationalization, pressure
opportunity
condition that allows fraud
lapping
rob peter to pay paul in the accounts receivable
kiting scheme
create cash by taking advantage of time between deposit and check clearing
rationalization
justify illegal behavior
hacking
unauthorized access and use of computer systems
hijacking
gaining control of someones computer without they knowing
zombies
combined power of botnets
denial of service attack
attacker send a recipient so many email bombs, that ISP email server is overloaded and shuts down
dictionary attacks
guess addresses at a company and send bglank email messages, not returned emails are vaild
splogs
referencing a webpage over other webpages to up the search results on google
spoofing
make an email message look as if its from someone else
zero day attack
attack between time of a vulnerability and the security vendors release software
masquerading
gaining access to system by pretending to be an authorized user
data diddling
changing data before during or after its entered into system
salami technique
embezzle large sums of money, a slice at a time from different accounts
round down fraud
all interest calculations are truncated, office space scam
cyber extortion
fruad perpetrators threaten online
click fraud
intentionally clicking on an ad numerous times to inflate advertising bills
pretexting
people acting under false pretenses to gain confidentail info
vishing
asking to call a specific phone number, told to enter confidential data there
pharming
redirecting a websites traffic to a bogus website
skimming
double swiping a credit card in a legit terminal, or covertly for later use