Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 6 : Computer Fraud and Abuse Techniques, Hacking, Hijacking,…
CHAPTER 6 : Computer Fraud and
Abuse Techniques
Computer Attacks and Abuse :
Social Engineering
:
Malware
Hacking
Hijacking
Botnet
zombie
bot herder
denial-of-service (DoS) attack
spamming
dictionary attack
splog
spoofing
zero-day attack
cross-site scripting (XSS)
buffer overflow attack
SQL injection (insertion) attack
man-in-the-middle (MITM)
attack
masquerading/impersonation
piggybacking
password cracking
war dialing
war driving
war rocketing
phreaking
data diddling
data leakage
podslurping
salami technique
round-down fraud
economic espionage
cyber-extortion
cyber-bullying
Sexting
Internet terrorism
Internet misinformation
e-mail threats
Internet auction fraud
Internet pump-and-dump
fraud
click fraud
web cramming
software piracy
Identity theft
pretexting
posing
phishing
vishing
carding
Pharming
evil twin
typosquatting/URL hijacking
QR barcode replacements
tabnapping
scavenging/dumpster diving
shoulder surfing
Lebanese looping
skimming
chipping
eavesdropping
spyware
adware
torpedo software
scareware
ransomware
keylogger
time bombs and logic bombs
trap-door / back door
packet sniffers
steganography program
rootkit
trojan horse
superzapping
virus
worm
bluesnarfing
bluebugging