hapter 6 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
HAPTER 6 PowerPoint Presentation
Download Presentation
HAPTER 6

Loading in 2 Seconds...

play fullscreen
1 / 13
yeshaya

HAPTER 6 - PowerPoint PPT Presentation

0 Views
Download Presentation
HAPTER 6
An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. HAPTER 6 Computer Fraud and Abuse Techniques

  2. INTRODUCTION • Questions to be addressed in this chapter: • Compare and contrast computer attack and abuse tactics. • Explain how social engineering techniques are used to gain physical or logical access to computer resources. • Describe the different types of malware used to harm computers.

  3. Computer Attacks and Abuse • Hacking • Unauthorized access, modification, or use of a computer system or other electronic device • Social Engineering • Techniques, usually psychological tricks, to gain access to sensitive data or information • Used to gain access to secure systems or locations • Malware • Any software which can be used to do harm

  4. Types of HackingAttacks • Botnet—Robot Network • Zombie • Denial-of-Service (DoS) Attack • Spamming • Dictionary Attacks • Spoofing

  5. Types of Spoofing • E-mail • Caller-ID • IP address • Address Resolution Protocol (ARP) • SMS • Web page • DNS

  6. Hacking Attacks • Zero-Day Attack • Cross-Site Scripting (XSS) • Buffer Overflow • SQL Injection (Insertion) • Man-in-the-Middle • Masquerading/Impersonation

  7. Additional Hacking Attacks • Piggybacking • Password Cracking • War Dialing • Phreaking • Data Diddling • Data Leakage • Podslurping

  8. Hacking Embezzlement Schemes • Salami Technique • Round down • Economic Espionage • Cyber-Extortion • Cyber-Bullying • Sexting • Internet Terrorism • Internet Misinformation

  9. Hacking for Fraud • E-mail Threats • Internet Auction Fraud • Internet Pump-and-Dump • Click Fraud • Web Cramming • Software Piracy

  10. Social Engineering Techniques • Identity Theft • Pretexting • Posing • Phishing • Pharming • Typosquatting • Tabnapping • Scavenging • Shoulder Surfing

  11. More Social Engineering • Lebanese Loping • Skimming • Chipping • Eavesdropping

  12. Type of Malware • Spyware • Adware • Scareware • Ransomware • Key logging • Trojan Horse • Time Bomb/Logic Bomb • Trap Door/Back Door • Packet Sniffers • Steganography • Rootkit

  13. More Malware • Superzapping • Virus • Worm • Bluebugging • Bluesnarfing