Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 6 ( Computer Fraud and Abuse Techniques ) - Coggle Diagram
Chapter 6
(
Computer Fraud and Abuse Techniques
)
Computer Attacks and Abuse
Hijacking
gaining control of a computer to carry out illicit activities without the user’s knowledge
Spamming
simultaneously sending the same unsolicited message to many people at the same time, often in an attempt to sell something
Hacking
unauthorized access, modification, or use of a electronic device or some element of a computer system
Spoofing
Altering some part of an electronic communication to make it look as if someone else sent the communication in order to gain the trust of the recipient
Types of spoofing
Caller ID spoofing
IP address spoofing
E-mail spoofing
Address Resolution Protocol (ARP) spoofing
SMS spoofing
Web-page spoofing
DNS spoofing
Zero-day attack
an attack between the time a new software vulnerability is discovered and the time a software developer releases a patch that fixes the problem.
Piggybacking
The clandestine use of a neighbor’s Wi-Fi network
An unauthorized person following an authorized person through a secure door, bypassing physical security controls such as keypads, ID cards, or biometric identification scanners.
Tapping into a communications line and electronically latching onto a legitimate user before the user enters a secure system; the legitimate user unknowingly carries the perpetrator into the system
Password cracking
penetrating a system’s defenses, stealing the file containing valid passwords, decrypting them, and using them to gain access to programs, files, and data
War dialing
programming a computer to dial thousands of phone lines searching for dial-up modem lines
Phreaking
attacking phone systems
Data diddling
changing data before or during entry into a computer system in order to delete, alter, add, or incorrectly update key system data
Data leakage
the unauthorized copying of company data
Podslurping
using a small device with storage capacity, such as an iPod or Flash drive, to download unauthorized data
Web cramming
offering a free website for a month, developing a worthless website, and charging the phone bill of the people who accept the offer for months, whether they want to continue using the website or not
Malware
any software that is used to do harm
Types of Malware
Trojan Horse
Virus
Keylogger
Worm
Spyware
Adware
ransomware
Scareware
rootkit
Keylogger
Packet sniffers
Steganography
programs
Superzapping
Social Engineering
refers to techniques or psychological tricks used to get people to comply with the perpetrator’s wishes in order to gain physical or logical access to a building, computer, server, or network
Examples of Social Engineering
Posing
Phishing
Pretexting
Skimming
Identity theft