1 / 13

HAPTER 6

HAPTER 6. Computer Fraud and Abuse Techniques. INTRODUCTION. Questions to be addressed in this chapter: Compare and contrast computer attack and abuse tactics. Explain how social engineering techniques are used to gain physical or logical access to computer resources.

yeshaya
Download Presentation

HAPTER 6

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. HAPTER 6 Computer Fraud and Abuse Techniques

  2. INTRODUCTION • Questions to be addressed in this chapter: • Compare and contrast computer attack and abuse tactics. • Explain how social engineering techniques are used to gain physical or logical access to computer resources. • Describe the different types of malware used to harm computers.

  3. Computer Attacks and Abuse • Hacking • Unauthorized access, modification, or use of a computer system or other electronic device • Social Engineering • Techniques, usually psychological tricks, to gain access to sensitive data or information • Used to gain access to secure systems or locations • Malware • Any software which can be used to do harm

  4. Types of HackingAttacks • Botnet—Robot Network • Zombie • Denial-of-Service (DoS) Attack • Spamming • Dictionary Attacks • Spoofing

  5. Types of Spoofing • E-mail • Caller-ID • IP address • Address Resolution Protocol (ARP) • SMS • Web page • DNS

  6. Hacking Attacks • Zero-Day Attack • Cross-Site Scripting (XSS) • Buffer Overflow • SQL Injection (Insertion) • Man-in-the-Middle • Masquerading/Impersonation

  7. Additional Hacking Attacks • Piggybacking • Password Cracking • War Dialing • Phreaking • Data Diddling • Data Leakage • Podslurping

  8. Hacking Embezzlement Schemes • Salami Technique • Round down • Economic Espionage • Cyber-Extortion • Cyber-Bullying • Sexting • Internet Terrorism • Internet Misinformation

  9. Hacking for Fraud • E-mail Threats • Internet Auction Fraud • Internet Pump-and-Dump • Click Fraud • Web Cramming • Software Piracy

  10. Social Engineering Techniques • Identity Theft • Pretexting • Posing • Phishing • Pharming • Typosquatting • Tabnapping • Scavenging • Shoulder Surfing

  11. More Social Engineering • Lebanese Loping • Skimming • Chipping • Eavesdropping

  12. Type of Malware • Spyware • Adware • Scareware • Ransomware • Key logging • Trojan Horse • Time Bomb/Logic Bomb • Trap Door/Back Door • Packet Sniffers • Steganography • Rootkit

  13. More Malware • Superzapping • Virus • Worm • Bluebugging • Bluesnarfing

More Related