33 terms

Computer Fraud and Abuse Techniques

Type of spyware that collects information about a user's Web browsing habits. Adware often is used by Internet advertising firms
"Taking control of someone else's phone to make calls or send text messages, or to monitor communications. "
stealing contact lists, images, other data by using bluetooth
botnet, bot herders
network of zombie compute that can be remotely controlled by a hacker
planting a small chip in a legit credit card reader. chip records transaction data
dictionary attack
(aka direct harvesting attacks) use special software to guess addresses at a particular company and send blank email messages. those that don't come back are valid
Evil twin
when a hacker sets up a wireless network with the same name (SSID) as the wireless access point at a local hot spot
key logger
software records computer activity, user's keystrokes, emails sent/received..
logic and time bombs
Software that sits idle until a specified circumstance or time triggers it, destroying programs, data
malicious software
packet sniffing
find confidential information using a computer while it travels the internet and other networks
redirecting a web site's traffic to a fake web site to gain confidential information
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail
attacking phone systems to obtain free phone line access; send viruses; access, steal and destroy data
three meanings: (1) clandestine use of a neighbor's wifi (2) tapping into telecom line and electronically latching on to a legitimate user and go with them into the system (3) unauthorized person passing through secure door when authorized person opens it
creating a seemingly legitimate business, collecting personal information to make a sale and never delivering a product
Acting under false pretenses to gain confidential information.
"Software that conceals processes, files, network connections, memory addresses, systems utility programs, and system data from the operating system."
salami technique
stealing tiny slices of money over time
double swiping a credit card in a legit terminal or on a side card reader to keep the information
unsolicited commercial e-mailing
spam blogs, promote affiliated websites to increase google PageRank (how often a web page is referenced by other web pages)
computer software that is designed to collect personal info about users without their informed consent
making an email message look as if someone else sent it
A method of hiding data within another media type, such as graphic, WAV file, or document
using special software to get past system controls and do illegal things
trap door
a way into a system that bypasses normal system controls.
trojan horse
Unauthorized code in an authorized and properly functioning program
voice phishing
war dialing
hackers search for dial-up modem lines by programming computers to dial thousands of phone lines
war driving
driving around looking for unprotected wireless networks
a software program capable of reproducing itself that can spread from one computer to the next over a network
Zero-day attack
An attack between the time a new software vulnerability is discovered and a software patch that fixes the problem is released