130 likes | 139 Views
HAPTER 6. Computer Fraud and Abuse Techniques. INTRODUCTION. Questions to be addressed in this chapter: Compare and contrast computer attack and abuse tactics. Explain how social engineering techniques are used to gain physical or logical access to computer resources.
E N D
HAPTER 6 Computer Fraud and Abuse Techniques
INTRODUCTION • Questions to be addressed in this chapter: • Compare and contrast computer attack and abuse tactics. • Explain how social engineering techniques are used to gain physical or logical access to computer resources. • Describe the different types of malware used to harm computers.
Computer Attacks and Abuse • Hacking • Unauthorized access, modification, or use of a computer system or other electronic device • Social Engineering • Techniques, usually psychological tricks, to gain access to sensitive data or information • Used to gain access to secure systems or locations • Malware • Any software which can be used to do harm
Types of HackingAttacks • Botnet—Robot Network • Zombie • Denial-of-Service (DoS) Attack • Spamming • Dictionary Attacks • Spoofing
Types of Spoofing • E-mail • Caller-ID • IP address • Address Resolution Protocol (ARP) • SMS • Web page • DNS
Hacking Attacks • Zero-Day Attack • Cross-Site Scripting (XSS) • Buffer Overflow • SQL Injection (Insertion) • Man-in-the-Middle • Masquerading/Impersonation
Additional Hacking Attacks • Piggybacking • Password Cracking • War Dialing • Phreaking • Data Diddling • Data Leakage • Podslurping
Hacking Embezzlement Schemes • Salami Technique • Round down • Economic Espionage • Cyber-Extortion • Cyber-Bullying • Sexting • Internet Terrorism • Internet Misinformation
Hacking for Fraud • E-mail Threats • Internet Auction Fraud • Internet Pump-and-Dump • Click Fraud • Web Cramming • Software Piracy
Social Engineering Techniques • Identity Theft • Pretexting • Posing • Phishing • Pharming • Typosquatting • Tabnapping • Scavenging • Shoulder Surfing
More Social Engineering • Lebanese Loping • Skimming • Chipping • Eavesdropping
Type of Malware • Spyware • Adware • Scareware • Ransomware • Key logging • Trojan Horse • Time Bomb/Logic Bomb • Trap Door/Back Door • Packet Sniffers • Steganography • Rootkit
More Malware • Superzapping • Virus • Worm • Bluebugging • Bluesnarfing