CHAPTER 6 : COMPUTER FRAUD AND ABUSE TECHNIQUES - Coggle Diagram
CHAPTER 6 : COMPUTER FRAUD AND ABUSE TECHNIQUES
COMPUTER ATTACKS AND ABUSE
- Unauthorized access, modification, or use of an electronic device or some element of a computer system
- Gaining control of someone else’s computer to carry out illicit activities.
- A network of powerful and dangerous hijacked computers that are used to attack systems or spread malware
- A hijacked computer, typically part of a botnet, that is used to launch a variety of Internet attacks.
- The person who creates a botnet by installing software on PCs that responds to the bot herder’s electronic instructions
Denial-of-service (DoS) attack
- A computer attack in which the attacker sends so many e-mail bombs or web page requests,
- Simultaneously sending the same unsolicited message to many people
- Using special software to guess company e-mail addresses and send them blank e-mail messages
- Spam blogs created to increase a website’s Google PageRank
- Altering some part of an electronic communication
IP Address Spoofing
Address Resolution Protocol (ARP) spoofing
- An attack between the time a new soft-ware vulnerability is discovered
- Code released by soft-ware developers that fixes a particular software vulnerability
- Using computer technology to support deliberate, repeated, and hostile behavior that torments, threat-ens, harasses, humiliates, embarrasses, or otherwise harms another person
- Using the Internet to spread false or misleading information
Techniques or psychological tricks used to get people to comply with the perpetrator’s wishes in order to gain physical or logical access to a building, computer, server, or network—usually to get the information needed to access a system and obtain confidential data.
- Assuming someone’s identity
- Using an invented scenario (the pretext) that creates legitimacy in the target’s mind in order to increase the likelihood that a victim will divulge information or do something.
- Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the product.
- Sending an electronic message pretending to be a legitimate company,
- Activities performed on stolen credit cards
Any software that is used to do harm.
Time bomb/Logic Bomb