• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/61

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

61 Cards in this Set

  • Front
  • Back
Sabotage
Intent is to destroy or harm a system or some of its components.
Cookie
Data that web sites store on your computer to identify their web sites to your computer and to identify you to the web site so you do not have to log on each time you visit the site.
Misappropriation of Assets
The theft of company assets. (Employee Fraud)
Fraudulent Financial Reporting
Intentional or reckless conduct that results in materially misleading financial statements.
Lapping Scheme
The perpetrator steals the cash or check that customer A mails in to pay its accounts receivable. Funds received at a later date from customer B are used to pay off customer A's balance. Funds from customer C are used to pay off customer B.
Kiting
The perpetrator creates cash by taking advantage of the timing lag between depositing a check and the check clearing the bank.
Rationalization
Allows perpetrators to justify their illegal behavior.
Computer Fraud
Any illegal act for which knowledge of computer technology is essential for its perpetration.
Hacking
The unauthorized access and use of computer systems.
War Dialing
Hackers who search for dial-up modem lines by programming computer to dial thousands of phone lines.
War Driving
Driving around looking for unprotected wireless networks.
War Chalking
Some war drivers draw chalk symbols on sidewalks to mark unprotected wireless networks.
War Rocketing
Sending rockets into the air that let loose wireless access points
Botnet
A robot network of hijacked computers.
Hijacking
Gaining control of someone else's computer to carry out illicit activities without the user's knowledge.
Zombies
Infected machines.
Denial-of-Service Attack
When an attacker sends a recipient so many e-mail bombs (thousands per second) from randomly generated false addresses. The recipient's Internet service provider e-mail server is overloaded and shuts down.
Spamming
E-mailing or text messaging the same unsolicited message to many people at the same time.
Dictionary Attacks
(AKA Direct Harvesting Attacks) Spammers use special software to guess addresses at a particular company and send bland e-mail messages. Messages not returned usually have valid e-mail addresses and are added to spammer e-mail lists.
Splogs
Spam blogs that promote affiliated web sites to increase their Google page rank.
Spoofing
Making an e-mail message look as if someone else sent it.
Zero-day Attack
An attack between the time a new software vulnerability is discovered and the software developers and the security vendors release software.
Password Cracking
Penetrating a system's defenses, stealing valid passwords, and decrypting them so they can be used to access system programs, files and data.
Masquerading or Impersonation
Gaining access to the system by pretending to be an authorized user.
Piggybacking
1. The clandestine use of a neighbor's Wi-Fi network. 2. Accompanying a legitimate user into a system by latching onto a legit user over a tapped telecommunications line. 3. Bypassing physical controls by following someone through a door.
Data Diddling
Changing data before, during or after it is entered into a system.
Data Leakage
The unauthorized copying of company data.
Salami Technique
Embezzle large sums of money a 'salami slice' at a time from many different accounts.
Round-down Fraud
All interest calculations are truncated at two decimal places and the excess decimals put into an account the perpetrator controls.
Phreaking
Attacking phone systems to access, destroy and steal data.
Economic Espionage
The theft of information, trade secrets and intellectual property.
Cyber-extortion
Fraud perpetrators threaten to harm a company if it does not pay a specified amount of money
Internet Terrorism
When hackers use the Internet to disrupt electronic commerce and to destroy company and individual communications.
Internet Misinformation
Using the internet to spread false or misleading information about people or companies.
E-mail Threats
E-mails sent asking a recipient to do something that makes it possible to defraud them.
Click Fraud
Intentionally clicking on ads numerous times to inflate advertising bills.
Software Piracy
Copying software without the publisher's permission.
Social Engineering
Techniques that tick a person into disclosing confidential information.
Identity Theft
Assuming someone's identity, usually for economic gain, by illegally obtaining confidential information, such as SS#.
Pretexting
People act under false pretense to gain confidential information.
Posing
Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the item sold.
Shoulder Surfing
Watching or listening to people give out confidential information.
Skimming
Double-swiping a credit card in a legitimate terminal or covertly swiping it in a card reader that records the data for later use.
Chipping
Posing as a service engineer and planting a small chip in a legitimate credit card reader that records transaction data.
Eavesdropping
Listening to private voice or data conversations, often using a wiretap.
Malware
Any software that can be used to do harm.
Spyware
Software that secretly collects personal information about users and sends it to someone else without the user's permission.
Adware
Using software to collect web-surfing and spending data and forward it to advertising or media organizations. It also causes banner ads to pop up on computer monitors.
Torpedo Software
Software that destroys competing malware, creating MALWARE WARS!!!!
Key Logger
Using malware to record a user's keystrokes.
Trojan Horse
A set of malicious computer instructions in an authorized and otherwise properly functioning program.
Time Bombs and Logic Bombs
Trojan horses that lie idle until triggered by specified time or circumstances.
Trap Door
Entering a system using a back door that bypasses normal system controls.
Packet Sniffers
Programs that capture data from information packets as they travel over the internet or company networks.
Steganography Programs
Hiding data from one file inside a host file such as a large image or sound file.
Rootkit
Software that conceals processes, files, network connections, and system data from the operating system and other programs.
Superzapping
Using special software to bypass regular system controls and perform illegal acts.
Virus
A segment of executable code that attaches itself to software, replicates itself, and spreads to other systems or files. Triggered by a predefined event, it damages system resources or displays a message on the monitor.
Bluesnarfing
Stealing contact lists, images and other data using Bluetooth.
Bluebugging
Taking control of someone else's phone to make calls, listen to calls, send text messages or read text messages.
Worm
Similar to a virus, but a program rather than a code segment hidden in a host program. Copies and actively transmits itself directly to other systems. It usually does not live very long but is quite destructive while alive.