Computer Fraud and Abuse Techniques

Created by Phileazi 

Upgrade to
remove ads

33 terms

adware

Type of spyware that collects information about a user's Web browsing habits. Adware often is used by Internet advertising firms

Bluebugging

"Taking control of someone else's phone to make calls or send text messages, or to monitor communications. "

Bluesnarfing

stealing contact lists, images, other data by using bluetooth

botnet, bot herders

network of zombie compute that can be remotely controlled by a hacker

chipping

planting a small chip in a legit credit card reader. chip records transaction data

dictionary attack

(aka direct harvesting attacks) use special software to guess addresses at a particular company and send blank email messages. those that don't come back are valid

Evil twin

when a hacker sets up a wireless network with the same name (SSID) as the wireless access point at a local hot spot

key logger

software records computer activity, user's keystrokes, emails sent/received..

logic and time bombs

Software that sits idle until a specified circumstance or time triggers it, destroying programs, data

malware

malicious software

packet sniffing

find confidential information using a computer while it travels the internet and other networks

pharming

redirecting a web site's traffic to a fake web site to gain confidential information

phishing

a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail

phreaking

attacking phone systems to obtain free phone line access; send viruses; access, steal and destroy data

piggybacking

three meanings: (1) clandestine use of a neighbor's wifi (2) tapping into telecom line and electronically latching on to a legitimate user and go with them into the system (3) unauthorized person passing through secure door when authorized person opens it

posing

creating a seemingly legitimate business, collecting personal information to make a sale and never delivering a product

pretexting

Acting under false pretenses to gain confidential information.

rootkit

"Software that conceals processes, files, network connections, memory addresses, systems utility programs, and system data from the operating system."

salami technique

stealing tiny slices of money over time

skimming

double swiping a credit card in a legit terminal or on a side card reader to keep the information

spamming

unsolicited commercial e-mailing

splog

spam blogs, promote affiliated websites to increase google PageRank (how often a web page is referenced by other web pages)

spyware

computer software that is designed to collect personal info about users without their informed consent

spoofing

making an email message look as if someone else sent it

steganography

A method of hiding data within another media type, such as graphic, WAV file, or document

superzapping

using special software to get past system controls and do illegal things

trap door

a way into a system that bypasses normal system controls.

trojan horse

Unauthorized code in an authorized and properly functioning program

vishing

voice phishing

war dialing

hackers search for dial-up modem lines by programming computers to dial thousands of phone lines

war driving

driving around looking for unprotected wireless networks

worm

a software program capable of reproducing itself that can spread from one computer to the next over a network

Zero-day attack

An attack between the time a new software vulnerability is discovered and a software patch that fixes the problem is released

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

NEW! Voice Recording

Click the mic to start.

Create Set