0% found this document useful (0 votes)
63 views32 pages

Reviewer IT 52)

The document defines and describes various types of fraud, computer crimes, and security threats. It covers topics such as sabotage, cookies, white-collar crime, corruption, investment fraud, hacking, spoofing, phishing, denial of service attacks, and spamming.

Uploaded by

Jasmine Gabiana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views32 pages

Reviewer IT 52)

The document defines and describes various types of fraud, computer crimes, and security threats. It covers topics such as sabotage, cookies, white-collar crime, corruption, investment fraud, hacking, spoofing, phishing, denial of service attacks, and spamming.

Uploaded by

Jasmine Gabiana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 32

Sabotage – An intentional act where the intent is to destroy a system some of its compo- nents.

Cookie-A text file created by a Web site and stored on a visi- tor’s hard drive. Cookies store information
about who the user is and what the user has done on the site.

Fraud-Any and all means a person uses to gain an unfair advantage over another person.

White-collar criminals – Typically, businesspeople who commit fraud. White-collar criminals usually
resort to trickery or cun- ning, and their crimes usually involve a violation of trust or confidence.

Corruption – Dishonest conduct by those in power which often involves actions that are illegiti- mate,
immoral, or incompatible with ethical standards. Examples include bribery and bid rigging.

Investment fraud – Misrepre- senting or leaving out facts in order to promote an investment that
promises fantastic profits with little or no risk. Examples include Ponzi schemes and securities fraud.

Misappropriation of assets – Theft of company assets by employees.

Fraudulent financial reporting – Intentional or reckless conduct, whether by act or omission, that results
in materially misleading financial statements.

Pressure – A person’s incentive or motivation for committing fraud.

Opportunity – The condition or situation that allows a person or organization to commit and conceal a
dishonest act and convert it to personal gain.

Lapping Concealing the theft of cash by means of a series of delays in posting collections to accounts
receivable.

Check kiting – Creating cash us- ing the lag between the time a check is deposited and the time it clears
the bank.
Rationalization – The excuse that fraud perpetrators use to justify their illegal behavior.

Computer fraud – Any type of fraud that requires computer technology to perpetrate.

INPUT FRAUD The simplest and most common way to commit a computer fraud is to alter or falsify
computer input. It requires little skill; perpetrators need only understand how the sys- tem operates so
they can cover their tracks.

PROCESSOR FRAUD Processor fraud includes unauthorized system use, including the theft of computer
time and services.

COMPUTER INSTRUCTIONS FRAUD Computer instructions fraud includes tampering with company
software, copying software illegally, using software in an unauthorized manner, and developing software
to carry out an unauthorized activity.

OUTPUT FRAUD Unless properly safeguarded, displayed or printed output can be stolen, copied, or
misused. A Dutch engineer showed that some monitors emit television-like sig- nals that, with the help
of some inexpensive electronic gear, can be displayed on a television screen.

CHAPTER 6

Hacking – Unauthorized access, modification, or use of an electronic device or some element of a


computer system.

Hijacking Gaining control of someone else’s computer to carry out illicit activities, such as sending spam
without the computer user’s knowledge.

Botnet – A network of powerful and dangerous hijacked com- puters that are used to attack systems or
spread malware.

Zombie – A hijacked computer, typically part of a botnet, that is used to launch a variety of Internet
attacks.
Bot herder The person who creates a botnet by installing software on PCs that responds to the bot
herder’s electronic instructions.

Denial-of-service (DoS) attack – A computer attack in which the attacker sends so many e-mail bombs or
web page requests, often from randomly generated false addresses, that the Internet service provider’s
e-mail server or the web server is overloaded and shuts down.

Spamming Simultaneously

Sending the same unsolicited

Message to many people, of

Ten in an attempt to sell them

Something.

Dictionary attack-Using special

Software to guess company

e-mail addresses and send them

blank e-mail messages. Unre

turned messages are usually

valid e-mail addresses that can


be added to spammer e-mail

lists.

Splog-Spam blogs created to

Increase a website’s Google

PageRank, which is how often

A web page is referenced by

Other web pages,

Spoofing-Altering some part

Of an electronic communication

To make it look as if someone

Else sent the communication in

Order to gain the trust of the

Recipient.

e-mail spoofing-Making a

sender address and other parts


of an e-mail header appear as

though the e-mail originated

from a different source.

Caller ID spoofing – Displaying

An incorrect number on the re-

Cipient’s caller ID display to hide

The caller’s identity.

IP address spoofing – Creating

Internet Protocol packets with

A forged IP address to hide

The sender’s identity or to im-

Personate another computer

System.
Address Resolution Protocol (ARP) spoofing Sending fake ARP messages to an Ethernet LAN. ARP is a
computer net working protocol for determin ing a network host’s hardware address when only its IP or
net work address is known.

MAC address – A Media Access Control address is a hardware address that uniquely identifies each node
on a network

SMS spoofing Using short message service (SMS) to change the name or number a text message appears
to come from.

Web-page spoofing-See phishing.

DNS spoofing-Sniffing the ID of a Domain Name System (DNS, the “phone book” of the Internet that
converts a domain, or website name, to an IP ad- dress) request and replying be- fore the real DNS
server.

Zero-day attack-An attack be- tween the time a new software. Vulnerability is discovered and “released
it into the wild” and the time a software developer releases a patch to fix the problem.

Patch-Code released by soft- ware developers that fixes a particular software vulnerability.

Cross-site scripting (XSS)-A vulnerability in dynamic web pages that allows an attacker to bypass a
browser’s security mechanisms and instruct the victim’s browser to execute code, thinking it came from
the desired website.

Buffer overflow attack – When the amount of data entered into a program is greater than the amount of
the input buffer. The input overflow overwrites the next computer instruction, causing the system to
crash. Hackers exploit this by crafting the input so that the overflow contains code that tells the
computer what to do next. This code could open a back door into the system.

SQL injection (insertion) attack – Inserting a malicious SQL query in input such that it is passed to and
executed by an application program. This allows a hacker to convince the application to run SQL code
that it was not intended to execute.
Attack- A hacker placing himself between a client and a host to intercept communications between
them

Man-in-the-middle (MITM) attack – A hacker placing himself between a client and a host to intercept
communications between them.

Masquerading/impersonation- Gaining access to a system by pretending to be an authorized user. This


requires that the per petrator know the legitimate. User’s ID and passwords.

Piggybacking (1) Tapping into a communications line and elec- tronically latching onto a le- gitimate user
who unknowingly carries the perpetrator into the system. (2) The clandestine use of a neighbor’s Wi-Fi
network. (3) An unauthorized person fol- lowing an authorized person through a secure door, bypass-
ing physical security controls.

Password cracking – When an intruder penetrates a system’s defenses, steals the file contain- ing valid
passwords, decrypts them, and uses them to gain access to programs, files, and data.

War dialing – Programming a computer to dial thousands of phone lines searching for dial- up modem
lines. Hackers hack into the PC attached to the modem and access the network to which it is connected.

War driving-Driving around looking for unprotected home or corporate wireless networks.

War rocketing-Using rockets to let loose wireless access points attached to parachutes that detect
unsecured wireless networks.

Phreaking-Attacking phone systems to obtain free phone line access, use phone lines to transmit
malware, and to ac cess, steal, and destroy data.

Data diddling – Changing data before or during entry into a computer system in order to delete, alter,
add, or incorrectly update key system data.
Data leakage – The unauthor ized copying of company data, often without leaving any indi cation that it
was copied.

Podslurping Using a small de-

Vice with storage capacity (iPod,

Flash drive) to download unau

Thorized data from a computer.

Salami technique-Stealing tiny

Slices of money from many dif

Ferent accounts.

10

11

Round-down fraud-Instructing

The computer to round down

All interest calculations to two


Decimal places. The fraction

Of a cent rounded down on

Each calculation is put into the

Programmer’s account.

Economic espionage – Theft of

Information, trade secrets, and

Intellectual property.

Cyber-extortion-Threatening to

Harm a company or a person if

A specified amount of money is not paid.

Cyber-bullying-Using computer technology to support delib- erate, repeated, and hostile behavior that
torments, threat- ens, harasses, humiliates, em- barrasses, or otherwise harms another person.

Sexting – Exchanging sexually explicit text messages and revealing pictures with other people, usually by
means of a phone.

Internet terrorism- Using the Internet to disrupt electronic commerce and harm computers and
communications.
Internet misinformation – Using the Internet to spread false or misleading information.

e-mail threats Threats sent to victims by e-mail. The threats usually require some follow-up action, often
at great expense to the victim.

Internet auction fraud – Using an Internet auction site to defraud another person.

Internet pump-and-dump fraud- Using the Internet to pump up the price of a stock and then sell it.

Click fraud – Manipulating the number of times an ad is clicked on to inflate advertising bills.

Web cramming-Offering a free website for a month, developing a worthless website, and charg- ing the
phone bill of the people who accept the offer for months, whether they want to continue using the
website or not.

Software piracy – The unauthor- ized copying or distribution of copyrighted software.

Social engineering -The tech- niques or psychological tricks used to get people to comply with the
perpetrator’s wishes in order to gain physical or logical access to a building, computer, server, or
network. It is usually to get the information needed to obtain confidential data.

Cisco reported that fraudsters take advantage of the following seven human traits in order to entice a
person to reveal information or take a specific action:

1. Compassion-The desire to help others who present themselves as really needing your help.

2. Greed-People are more likely to cooperate if they get something free or think they are getting a
once-in-a-lifetime deal.

3. Sex Appeal People are more likely to cooperate with someone who is flirtatious or
Viewed as “hot.”

4. Sloth Few people want to do things the hard way, waste time, or do something unpleas- ant;
fraudsters take advantage of our lazy habits and tendencies.

5. Trust People are more likely to cooperate with people who gain their trust.

6. Urgency-A sense of urgency or immediate need that must be met leads people to be more
cooperative and accommodating.

7. Vanity People are more likely to cooperate if you appeal to their vanity by telling them they are
going to be more popular or successful.

Establishing the following policies and procedures and people to follow them- can help minimize social
engineering:

1. Never let people follow you into a restricted building.

2. Never log in for someone else on a computer, especially if you have administrative access.

3. Never give sensitive information over the phone or through e-mail.

4. Never share passwords or user IDs.

5. Be cautious of anyone you do not know who is trying to gain access through you.

Identity theft-Assuming
Someone’s identity, usually for

Economic gain, by illegally ob-

Taining confidential information

Such as a Social Security number

Or a bank account or credit card

Number.

Pretexting – Using an invented

Scenario (the pretext) that cre-

Ates legitimacy in the target’s

Mind in order to increase the

Likelihood that a victim will

Divulge information or do

Something.

Posing Creating a seemingly


Legitimate business, collecting

Personal information while mak-

Ing a sale, and never delivering

The product.

Phishing-Sending an electronic

Message pretending to be a

Legitimate company, usually a

Financial institution, and request-

Ing information or verification

Of information and often warn-

Ing of a consequence if it is not

Provided. The request is bogus,

And the information gathered is

Used to commit identity theft or

To steal funds from the victim’s


Account.

Vishing – Voice phishing; it is like phishing except that the victim enters confidential data by phone:

Carding – Activities performed on stolen credit cards, including making a small online purchase to
determine whether the card is still valid and buying and sell- ing stolen credit card numbers.

Pharming – Redirecting website traffic to a spoofed website.

Evil twin – A wireless network with the same name (Service Set Identifier) as a legitimate wireless access
point. Users are connected to the twin because it has a stronger wireless signal or the twin disrupts or
disables the legitimate access point. Users are unaware that they connect to the evil twin and the perpe-
trator monitors the traffic look- ing for confidential information.

Typosquatting/URL hijacking Setting up similarly named websites so that users making typographical
errors when entering a website name are sent to an invalid site.

QR barcode replacements – Fraudsters cover valid Quick Response codes with stickers containing a
replacement QR code to fool people into going to an unintended site that infects their phones with
malware.

Tabnapping – Secretly changing an already open browser tab in order to capture user IDs and passwords
when the victim logs back into the site.

Scavenging/dumpster diving – Searching documents and records to gain access to con- fidential
information. Scaveng- ing methods include searching garbage cans, communal trash bins, and city
dumps.

Shoulder surfing – When per- petrators look over a person’s shoulders in a public place to get
information such as ATM PIN numbers or user IDs and passwords.
Lebanese looping-Inserting a sleeve into an ATM that prevents it from ejecting the card. The perpetrator
pretends to help the victim, tricking the person into entering the PIN again. Once the victim gives up, the
thief removes the card and uses it and the PIN to withdraw money.

Skimming-Double-swiping a credit card in a legitimate termi- nal or covertly swiping a credit card in a
small, hidden, hand- held card reader that records credit card data for later use.

Chipping-Posing as a service en- gineer and planting a small chip that records transaction data in a
legitimate credit card reader. The chip is later removed to access the data recorded on it.

Eavesdropping – Listening to private communications or tap- ping into data transmissions intended for
someone else. One way to intercept signals is by setting up a wiretap.

Malware-Any software that is used to do harm.

Spyware Software that secretly monitors computer usage, collects personal information about users,
and sends it to someone else, often without the computer user’s permission.

Adware – Spyware that causes banner ads to pop up on a monitor, collects information about the user’s
web-surfing and spending habits, and for- wards it to the adware creator, often an advertising or media
organization. Adware usually comes bundled with freeware and shareware downloaded from the
internet.

Torpedo software – Software that destroys competing mal- ware. This sometimes results in “malware
warfare” between competing malware developers.

Scareware Malicious software of no benefit that is sold using scare tactics.

Ransomware-Software that en crypts programs and data until a ransom is paid to remove it.
Keylogger-Software that records computer activity, such as a user’s keystrokes, e-mails sent and
received, websites visited, and chat session participation.

Trojan horse-A set of unau

Thorized computer instructions

In an authorized and otherwise

Properly functioning program.

Time bomb/logic bomb – A program that lies idle until some specified circumstance or a particular time
triggers it. Once triggered, the program sabotages the system by de stroying programs or data.

Trap door/back door – A set of computer instructions that allows a user to bypass the system’s normal
controls.

Packet sniffers – Programs that capture data from information packets as they travel over the Internet
or company networks. Captured data is sifted to find confidential or proprietary information.

Steganography program – A program that can merge con- fidential information with a seemingly
harmless file, pass- word protect the file, send it anywhere in the world, where the file is unlocked and
the confidential information is reas- sembled. The host file can still be heard or viewed because hu-
mans are not sensitive enough to pick up the slight decrease in image or sound quality.

Rootkit – A means of concealing system components and mal- ware from the operating system and
other programs; can also modify the operating system.

Superzapping-The unauthor
Ized use of a special system.

Program to bypass regular

System controls and perform

Illegal acts. The superzap utility

Was originally written to handle

Emergencies, such as restoring

A system that had crashed.

Virus-A segment of executable

Code that attaches itself to a

File, program, or some other

Executable system component.

When the hidden program is

Triggered, it makes unauthor

Ized alterations to the way a


System operates.

10

Worm-Similar to a virus, except

That it is a program rather than

A code segment hidden in a

Host program. A worm also

Copies itself automatically and

Actively transmits itself directly

To other systems.

Bluesnarfing – Stealing (snarfing) contact lists, images, and other data using flaws in Bluetooth
applications.

TECHNIQUE

Address Resolution
Protocol (ARP) spoofing

Adware

Bluebugging

Bluesnarfing

Botnet, bot herders

Buffer overflow attack

Caller ID spoofing

Carding

Chipping

Click fraud

Cross-site scripting

(XSS) attack

Cyber-bullying

Cyber-extortion
Data diddling

Data leakage

Denial-of-service

Attack

Dictionary attack

DNS spoofing

Eavesdropping

Econornic espionage

E-mail spoofing

E-mail threats

Evil twin

Hacking

Hijacking

Identity theft

Internet auction fraud


Internet misinformation

DESCRIPTION

Sending fake ARP messages to an Ethernet LAN. ARP is a computer networking protocol for determining
a network host’s hardware address when only its IP or network address is known.

Spyware that collects and forwardis data to advertising companies or causes banner ads to pop-up as

The Internet is surfed. Taking control of a phone to make calls, send text messages, listen to calls, or
read text messages.

Stealing contact lists, images, and other data using Bluetooth.

A network of hijacked computers. Bot herders use the hijacked computers, called zombies, in a variety
of attacks.

Inputting so much data that the input buffer overflows. The overflow contains code that takes control

Of the computer

Displaying an incorrect number on the recipient’s caller ID display to hide the identity of the caller.

Verifying credit card validity; buying and selling stolen credit cards.

Planting a chip that records transaction data in a legitimate credit card reader.

Manipulating the number of times an ad is clicked on to inflate advertising bills.


Exploits web page security vulnerabilities to bypass browser security mechanisms and create a mali-
cious link that injects unwanted code into a website.

Using computer technology to harm another person.

Requiring a company to pay money to keep an extortionist from harming a computer or a person.
Changing data before or during entry into a computer system to delete, alter, add, or incorrectly up-

Date data.

Unauthorized copying of company data.

An attack designed to make computer resources unavailable to its users. For example, so many

e-mail messages that the Internet service provider’s e-mail server is overloaded and shuts down.

Using software to guess company addresses, send employees blank e-mails, and add unreturned
messages to spammer e-mail lists.

Sniffing the ID of a Domain Name System (server that converts a website name to an IP address) re-

Quest and replying before the real DNS server. Listening to private voice or data transmissions.

The theft of information, trade secrets, and intellectual property.

Making a sender address and other parts of an e-mail header appear as though the e-mail originated

From a different source. Sending a threatening message asking recipients to do something that makes it
possible to defraud
Them. A wireless network with the same name as another wireless access point. Users unknowingly
connect to the evil twin; hackers monitor the traffic looking for useful information.

Unauthorized access, modification, or use of an electronic device or some element of a computer

System. Gaining control of someone else’s computer for illicit activities. Assuming someone’s identity by
illegally obtaining confidential information such as a Social Security

Number.

Using an Internet auction site to commit fraud.

Using the Internet to spread false or misleading information.

Internet terrorism

Internet pump-and-

Dump fraud

IP address spoofing

Keylogger

Lebanese looping

MAC address
Malware

Man-in-the-middle (MITM) attack Masquerading/

Impersonation

Packet sniffers

Password cracking

Pharming

Phishing

Phreaking

Piggybacking

Podslurping

Posing

Pretexting

QR barcode

Replacements

Ransomware
Rootkit

Round-down fraud

Salami technique

Scareware

Scavenging/dumpster

Diving

Sexting

Shoulder surfing

Skimming

SMS spoofing

Social engineering

Software piracy

Spamming

Splog
Using the Internet to disrupt communications and e-commerce. Using the Internet to pump up the price
of a stock and then sell it.

Creating IP packets with a forged IP address to hide the sender’s identity or to impersonate another
computer system.

Using spyware to record a user’s keystrokes.

Inserting a sleeve into an ATM so that it will not eject the victim’s card, pretending to help the victim as
a means of obtaining his PIN, and using the card and PIN to drain the account.

A Media Access Control address is a hardware address that uniquely identifies each node on a network.

Software that is used to do harm.

A hacker placing himself between a client and a host to intercept network traffic; also called session

Hijacking.

Gaining access to a system by pretending to be an authorized user. The impersonator enjoys the same
privileges as the legitimate user

Inspecting information packets as they travel across computer networks.

Penetrating system defensès, stealing passwords, and decrypting them to access system programs, files,
and data.

Redirecting traffic to a spoofed website to obtain confidential information.

Communications that recipients to disclose confidential information by responding to an


e-mail or visiting a website

Attacking phone systems to get free phone access; using phone lines to transmit viruses and to

Access, steal, and destroy data.

1. Clandestine use of someone’s Wi-Fi network,

2. Tapping into a communications line and entering a system by latching onto a legitimate user.

3. Bypassing physical security controls by entering a secure door when an authorized person opens
it

Using a small device with storage capacity (iPod, Flash drive) to download unauthorized data from a

Computer.

Creating a seemingly legitimate business, collecting personal data while making a sale, and never

Delivering items sold

Acting under false pretenses to gain confidential information.

Covering valid Quick Response codes with stickers containing replacement QR codes to fool people into
going to an unintended site,

Software that encrypts programs and data until a ransom is paid to remove it.
Software that conceals processes, files, network connections, and system data from the operating
system and other programs, can also change the operating system.

Truncating interest calculations at two decimal places and placing truncated amounts in the perpetra-

Tor’s account.

Stealing tiny slices of money over time.

Malicious software of no benefit that is sold using scare tactics,

Searching for documents and records in garbage cans, communal trash bins, and city dumps to obtain
confidential information.

Exchanging sexually explicit text messages and pictures, usually by phone.

Watching or listening to people enter or disclose confidential data.

Double-swiping a credit card or covertly swiping it in a card reader to record the data for later use. Using
short message service (SMS) to change the name or number a text message appears to come from.

Techniques that trick a person into disclosing confidential information,

Unauthorized copying or distribution of copyrighted software.

Sending unsolicited message to many people at the same time.

A spam blog that promotes websites to increase their Google PageRank (how often a web page is by
other pages.
Spoofing

Making an electronic communication look like someone else sent it.

Software that monitors computing habits and sends that data to someone else, often without the

User’s permission.

Spyware

SQL injection attack

Inserting a malicious SQL query in input such that it is passed to and executed by an application
program.

Steganography

Hiding data inside a host file, such as a large image or sound file. Using special software to bypass
system controls and perform illegal acts.

Superzapping

Secretly changing an already open browser tab using JavaScript.

Tabnapping

Time bomb/logic bomb


Software that sits idle until a specified circumstance or time triggers it, destroying programs, data, or
both. Software that destroys competing malware.

Torpedo software

Trap door / back door

A back door into a system that bypasses normal system controls.

Trojan horse

Unauthorized code in an authorized and properly functioning program.

Typosquatting/URL hijacking

Websites with names similar to real websites; users making typographical errors are sent to a site filled
with malware.

Virus

Executable code that attaches itself to software, replicates itself, and spreads to other systems or files.
When triggered, it makes unauthorized alterations to the way a system operates.

Vishing

Voice phishing, in which e-mail recipients are asked to call a phone number that asks them to divulge
confidential data.

War dialing
Dialing phone lines to find idle modems to use to enter a system, capture the attached computer, and
gain access to its network(s).

War driving/rocketing Web cramming

Looking for unprotected wireless networks using a car or a rocket.

Developing a free and worthless trial-version website and charging the subscriber’s phone bill for
months even if the subscriber cancels.

Web-page spoofing

Also called phishing.

Worm

Similar to a virus; a program rather than a code segment hidden in a host program. Actively transmits
itself to other systems. It usually does not live long but is quite destructive while alive.

Zero-day attack

Attack between the time a software vulnerability is discovered and a patch to fix the problem is
released.

Zombie

A hijacked computer, typically part of a botnet, that is used to launch a variety of Internet attacks.

You might also like