Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
61 Cards in this Set
- Front
- Back
Sabotage
|
Intent is to destroy or harm a system or some of its components.
|
|
Cookie
|
Data that web sites store on your computer to identify their web sites to your computer and to identify you to the web site so you do not have to log on each time you visit the site.
|
|
Misappropriation of Assets
|
The theft of company assets. (Employee Fraud)
|
|
Fraudulent Financial Reporting
|
Intentional or reckless conduct that results in materially misleading financial statements.
|
|
Lapping Scheme
|
The perpetrator steals the cash or check that customer A mails in to pay its accounts receivable. Funds received at a later date from customer B are used to pay off customer A's balance. Funds from customer C are used to pay off customer B.
|
|
Kiting
|
The perpetrator creates cash by taking advantage of the timing lag between depositing a check and the check clearing the bank.
|
|
Rationalization
|
Allows perpetrators to justify their illegal behavior.
|
|
Computer Fraud
|
Any illegal act for which knowledge of computer technology is essential for its perpetration.
|
|
Hacking
|
The unauthorized access and use of computer systems.
|
|
War Dialing
|
Hackers who search for dial-up modem lines by programming computer to dial thousands of phone lines.
|
|
War Driving
|
Driving around looking for unprotected wireless networks.
|
|
War Chalking
|
Some war drivers draw chalk symbols on sidewalks to mark unprotected wireless networks.
|
|
War Rocketing
|
Sending rockets into the air that let loose wireless access points
|
|
Botnet
|
A robot network of hijacked computers.
|
|
Hijacking
|
Gaining control of someone else's computer to carry out illicit activities without the user's knowledge.
|
|
Zombies
|
Infected machines.
|
|
Denial-of-Service Attack
|
When an attacker sends a recipient so many e-mail bombs (thousands per second) from randomly generated false addresses. The recipient's Internet service provider e-mail server is overloaded and shuts down.
|
|
Spamming
|
E-mailing or text messaging the same unsolicited message to many people at the same time.
|
|
Dictionary Attacks
|
(AKA Direct Harvesting Attacks) Spammers use special software to guess addresses at a particular company and send bland e-mail messages. Messages not returned usually have valid e-mail addresses and are added to spammer e-mail lists.
|
|
Splogs
|
Spam blogs that promote affiliated web sites to increase their Google page rank.
|
|
Spoofing
|
Making an e-mail message look as if someone else sent it.
|
|
Zero-day Attack
|
An attack between the time a new software vulnerability is discovered and the software developers and the security vendors release software.
|
|
Password Cracking
|
Penetrating a system's defenses, stealing valid passwords, and decrypting them so they can be used to access system programs, files and data.
|
|
Masquerading or Impersonation
|
Gaining access to the system by pretending to be an authorized user.
|
|
Piggybacking
|
1. The clandestine use of a neighbor's Wi-Fi network. 2. Accompanying a legitimate user into a system by latching onto a legit user over a tapped telecommunications line. 3. Bypassing physical controls by following someone through a door.
|
|
Data Diddling
|
Changing data before, during or after it is entered into a system.
|
|
Data Leakage
|
The unauthorized copying of company data.
|
|
Salami Technique
|
Embezzle large sums of money a 'salami slice' at a time from many different accounts.
|
|
Round-down Fraud
|
All interest calculations are truncated at two decimal places and the excess decimals put into an account the perpetrator controls.
|
|
Phreaking
|
Attacking phone systems to access, destroy and steal data.
|
|
Economic Espionage
|
The theft of information, trade secrets and intellectual property.
|
|
Cyber-extortion
|
Fraud perpetrators threaten to harm a company if it does not pay a specified amount of money
|
|
Internet Terrorism
|
When hackers use the Internet to disrupt electronic commerce and to destroy company and individual communications.
|
|
Internet Misinformation
|
Using the internet to spread false or misleading information about people or companies.
|
|
E-mail Threats
|
E-mails sent asking a recipient to do something that makes it possible to defraud them.
|
|
Click Fraud
|
Intentionally clicking on ads numerous times to inflate advertising bills.
|
|
Software Piracy
|
Copying software without the publisher's permission.
|
|
Social Engineering
|
Techniques that tick a person into disclosing confidential information.
|
|
Identity Theft
|
Assuming someone's identity, usually for economic gain, by illegally obtaining confidential information, such as SS#.
|
|
Pretexting
|
People act under false pretense to gain confidential information.
|
|
Posing
|
Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the item sold.
|
|
Shoulder Surfing
|
Watching or listening to people give out confidential information.
|
|
Skimming
|
Double-swiping a credit card in a legitimate terminal or covertly swiping it in a card reader that records the data for later use.
|
|
Chipping
|
Posing as a service engineer and planting a small chip in a legitimate credit card reader that records transaction data.
|
|
Eavesdropping
|
Listening to private voice or data conversations, often using a wiretap.
|
|
Malware
|
Any software that can be used to do harm.
|
|
Spyware
|
Software that secretly collects personal information about users and sends it to someone else without the user's permission.
|
|
Adware
|
Using software to collect web-surfing and spending data and forward it to advertising or media organizations. It also causes banner ads to pop up on computer monitors.
|
|
Torpedo Software
|
Software that destroys competing malware, creating MALWARE WARS!!!!
|
|
Key Logger
|
Using malware to record a user's keystrokes.
|
|
Trojan Horse
|
A set of malicious computer instructions in an authorized and otherwise properly functioning program.
|
|
Time Bombs and Logic Bombs
|
Trojan horses that lie idle until triggered by specified time or circumstances.
|
|
Trap Door
|
Entering a system using a back door that bypasses normal system controls.
|
|
Packet Sniffers
|
Programs that capture data from information packets as they travel over the internet or company networks.
|
|
Steganography Programs
|
Hiding data from one file inside a host file such as a large image or sound file.
|
|
Rootkit
|
Software that conceals processes, files, network connections, and system data from the operating system and other programs.
|
|
Superzapping
|
Using special software to bypass regular system controls and perform illegal acts.
|
|
Virus
|
A segment of executable code that attaches itself to software, replicates itself, and spreads to other systems or files. Triggered by a predefined event, it damages system resources or displays a message on the monitor.
|
|
Bluesnarfing
|
Stealing contact lists, images and other data using Bluetooth.
|
|
Bluebugging
|
Taking control of someone else's phone to make calls, listen to calls, send text messages or read text messages.
|
|
Worm
|
Similar to a virus, but a program rather than a code segment hidden in a host program. Copies and actively transmits itself directly to other systems. It usually does not live very long but is quite destructive while alive.
|