Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 6 : COMPUTER FRAUD & ABBUSE TECHNIQUES - Coggle Diagram
CHAPTER 6 : COMPUTER FRAUD & ABBUSE TECHNIQUES
ways to attack and abuse computer
Hacking :-this iis pprooviding unauthrized acces to modifiying or using a computer system
Botnet
Hijacking
Bothered
Zombies
Denial-of-service(DoS) attack
Spamming
Spoofing :- altering some part of an electronic communication on to make it look as if someone else sent coommunication in order to gain the trust of the receipt
Social engineering :- techniques used to get people comply with the perpetrator wishes
indentity theft
pretexting
posing
phishing
skimming
Cross-site scriping(xss) :- here the vulnerability of a web application is used to transfer data of the user to collect
Butter Overflow Attack :- large amount od data sent to system making it input memory overloaded with the intention make the system crashing
SQL Injection Attack:- a malicious code placed in a query with the intention access to get to the database
Malware
trojan horse
virus
spyware
worm
kylagger
why a person would reveal information or take a specific action
sentiment :- they want to help people
greed :- they would like to get a something for free
sex appeal :- it is a flirt or a viewed as 'hot'
sloth:- one is not more alert by routine and habits
Trust:- too trusting of people by getting confidence
ugency:- sense of urgency or immediate need that must be mt leads people be more coorperative and accomodating
Vanity:- people are more likely to cooperate if you appeal to their vanity by telling them they are going to be more popular or succesful
prevent social engineering
never allow people to into restricted building
never log in to another on a computer
never give out sensitive information by phone or by mail
never share password or username with someone
be caution of anyone you do not know who is trying to gain access through you