Please enable JavaScript.
Coggle requires JavaScript to display documents.
COMPUTER FRAUD AND ABUSE TECHNIQUES - Coggle Diagram
COMPUTER FRAUD AND ABUSE TECHNIQUES
COMPUTER ATTACKS AND ABUSE
Hacking
Hijacking
Botnet
zombies
bot herders
Denial of service (DoS) attack
Spamming
Dictionary attacks
Splogs
Spoofing
Email
Caller ID
IP address
Address Resolution Protocol ARP
SMS
Web page
DNS
Zero Day Attack
Cross Site Scripting
Butter overflow attack
SQL injection attack
Man in the middle (MITM) attack
Masquerading or impersonation
Piggybacking
Password cracking
War dialing
Phreaking
Data diddling
Data leakage
Cyber extortion
Cyber bullying
Sexting
Internet terrorism
Internet misinformation
Internet auction fraud
Click fraud
Web cramming
Software piracy
SOCIAL ENGINEERING
refers to techniques or psychological tricks used to get people to comply with the perpetrator's wishes in order to gain physical or logical access to a building, computer, server or network
to minimize :
Never let people follow you
never log in for someone else
Never give sensitive information
Never share passwords or user IDs
Be cautious of anyone you do not know
Identify thef
t
pretexting
Posing
Phishing
Vishing
Carding
Pharming
MALWARE
any software that is used to do harm
SPYWARE
ADWARE
SCAREWARE
KEYLOGGER
TROJAN HORSE
TIME BOMBS AND LOGIC BOMBS
TRAP DOOR OR BACK DOOR
PACKET SNIFFERS