How can we help?

You can also find more resources in our Help Center.

33 terms

Computer Fraud and Abuse Techniques

STUDY
PLAY
adware
Type of spyware that collects information about a user's Web browsing habits. Adware often is used by Internet advertising firms
Bluebugging
"Taking control of someone else's phone to make calls or send text messages, or to monitor communications. "
Bluesnarfing
stealing contact lists, images, other data by using bluetooth
botnet, bot herders
network of zombie compute that can be remotely controlled by a hacker
chipping
planting a small chip in a legit credit card reader. chip records transaction data
dictionary attack
(aka direct harvesting attacks) use special software to guess addresses at a particular company and send blank email messages. those that don't come back are valid
Evil twin
when a hacker sets up a wireless network with the same name (SSID) as the wireless access point at a local hot spot
key logger
software records computer activity, user's keystrokes, emails sent/received..
logic and time bombs
Software that sits idle until a specified circumstance or time triggers it, destroying programs, data
malware
malicious software
packet sniffing
find confidential information using a computer while it travels the internet and other networks
pharming
redirecting a web site's traffic to a fake web site to gain confidential information
phishing
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail
phreaking
attacking phone systems to obtain free phone line access; send viruses; access, steal and destroy data
piggybacking
three meanings: (1) clandestine use of a neighbor's wifi (2) tapping into telecom line and electronically latching on to a legitimate user and go with them into the system (3) unauthorized person passing through secure door when authorized person opens it
posing
creating a seemingly legitimate business, collecting personal information to make a sale and never delivering a product
pretexting
Acting under false pretenses to gain confidential information.
rootkit
"Software that conceals processes, files, network connections, memory addresses, systems utility programs, and system data from the operating system."
salami technique
stealing tiny slices of money over time
skimming
double swiping a credit card in a legit terminal or on a side card reader to keep the information
spamming
unsolicited commercial e-mailing
splog
spam blogs, promote affiliated websites to increase google PageRank (how often a web page is referenced by other web pages)
spyware
computer software that is designed to collect personal info about users without their informed consent
spoofing
making an email message look as if someone else sent it
steganography
A method of hiding data within another media type, such as graphic, WAV file, or document
superzapping
using special software to get past system controls and do illegal things
trap door
a way into a system that bypasses normal system controls.
trojan horse
Unauthorized code in an authorized and properly functioning program
vishing
voice phishing
war dialing
hackers search for dial-up modem lines by programming computers to dial thousands of phone lines
war driving
driving around looking for unprotected wireless networks
worm
a software program capable of reproducing itself that can spread from one computer to the next over a network
Zero-day attack
An attack between the time a new software vulnerability is discovered and a software patch that fixes the problem is released