Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 6 - COMPUTER FRAUD AND ABUSE TECHNIQUES - Coggle Diagram
CHAPTER 6 - COMPUTER FRAUD AND ABUSE TECHNIQUES
Computer Attacks and Abuse
IP address spoofing
Address Resolution Protocol (ARP) spoofing
Caller ID spoofing
MAC address
E-mail spoofing
SMS spoofing
Spoofing
Web-page spoofing
Splogs
DNS spoofing
Dictionary attacks
Zero-day attack
Spamming
Patch
Denial-of-Service (DoS) attack
Cross-site scripting (XSS)
Bot herders
Buffer overflow attack
Zombies
SQL injection (insertion) attack
Botnet
man-in-the-middle (MITM) attack
Hijacking
Password cracking
Hacking
War dialing
Masquerading or impersonation
War driving
Piggybacking
War rocketing
Phreaking
Podslurping
Data diddling
Salami technique
Data leakage
Round-down fraud
Economic espionage
Sexting
Cyber-extortion
Internet terrorism
Cyber-bullying
Internet misinformation
Internet auction fraud
e-mail threats
Internet pump-and-dump fraud
Web cramming
Click fraud
Software piracy
Malware
trap door, or back door
Packet sniffers
Time bombs and logic bombs
Steganography programs
Trojan horse
Rootkit
Keylogger
Superzapping
Ransomware
Virus
Scareware
Worm
Torpedo software
Bluesnarfing
Adware
Bluebugging
Spyware
Social Engineering
Typosquatting, or URL hijacking
QR barcode replacements
evil twin
Tabnapping
Pharming
Scavenging, or dumpster diving
Carding
shoulder surfing
vishing
Lebanese looping
Phishing
Skimming
Posing
Chipping
Pretexting
Eavesdropping
Identity theft