Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 6 : COMPUTER FRAUD AND ABUSE TECHNIQUES - Coggle Diagram
CHAPTER 6 : COMPUTER FRAUD AND ABUSE TECHNIQUES
COMPUTER ATTACKS AND ABUSE
Hacking
- Unauthorized access, modification, or use of an electronic device or some element of a computer system
Hijacking
- Gaining control of someone else’s computer to carry out illicit activities.
Botnet
- A network of powerful and dangerous hijacked computers that are used to attack systems or spread malware
Zombie
- A hijacked computer, typically part of a botnet, that is used to launch a variety of Internet attacks.
Bot herder
- The person who creates a botnet by installing software on PCs that responds to the bot herder’s electronic instructions
Denial-of-service (DoS) attack
- A computer attack in which the attacker sends so many e-mail bombs or web page requests,
Spamming
- Simultaneously sending the same unsolicited message to many people
Dictionary attack
- Using special software to guess company e-mail addresses and send them blank e-mail messages
Splog
- Spam blogs created to increase a website’s Google PageRank
Spoofing
- Altering some part of an electronic communication
Email Spoofing
Caller-id Spoofing
IP Address Spoofing
Address Resolution Protocol (ARP) spoofing
MAC address
SMS spoofing
web-page spoofing
DNS spoofing
Zero-day attack
- An attack between the time a new soft-ware vulnerability is discovered
Patch
- Code released by soft-ware developers that fixes a particular software vulnerability
Cyber-bullying
- Using computer technology to support deliberate, repeated, and hostile behavior that torments, threat-ens, harasses, humiliates, embarrasses, or otherwise harms another person
Internet misinformation
- Using the Internet to spread false or misleading information
SOCIAL ENGINEERING
Techniques or psychological tricks used to get people to comply with the perpetrator’s wishes in order to gain physical or logical access to a building, computer, server, or network—usually to get the information needed to access a system and obtain confidential data.
Identity theft
- Assuming someone’s identity
Pretexting
- Using an invented scenario (the pretext) that creates legitimacy in the target’s mind in order to increase the likelihood that a victim will divulge information or do something.
posing
- Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the product.
phishing
- Sending an electronic message pretending to be a legitimate company,
carding
- Activities performed on stolen credit cards
MALWARE
Any software that is used to do harm.
Spyware
Adware
Torpedo Software
Scareware
Ransomware
Keylogger
Trojan Horse
Time bomb/Logic Bomb
Worm
Virus