1. Rephrase each definition in your own words
Salami shaving |
Manipulating programs or data in order to take small amounts of money from many different accounts. The victims are often unaware because the amounts are so small |
Trojan horse |
Contains hidden instructions to do prohibited tasks while appearing to do something useful |
Piggybacking |
Using another person’s identification code or files before he/she has logged off |
2. The transformation factor is one of the reasons that make computer ethics important, explain this concept.
Salami Shaving :
A salami shaving occurs when a small attack combines a large attack that may be undesirable due to the nature of this type of cyber crime. It is also known as salami slicing / penny shaving where the attacker uses an online database to catch up customers' information, which is a bank / credit card statement, subtracting the amount from each account over a period of time. Most people do not report the deduction, often letting it go because of the amount involved. This can be a fraction of one percent to avoid suspicion from the unsafe customer.
Example : Suppose in one bank have thousand of customer account and when attacker steal unaware money from different different accounts by hijacking accounts details which are gethering using some maleware or someware viruses.
Trojan Horse :
Trojan horse is one type of program downloaded and installed on a computer that appears harmless and it can take control of your computer. A Trojan is make for to damage, steal, or some other harmful action on your data or network.
Trojan is sometime calls "Trojan Virus" or "Trojan Horse Virus" and virus can execute and replicate themselves.
Example : Suppose your have received an email from someone you know and click on attached document button but you have been fooled, the email is from attacker and downloaded and opened file has gone on to installed malware on you device when execute the program the malware can seprate to other file and damage your computer.
Protect against Trojan :
Piggybacking :
"Piggybacking" refers to a situation where an unauthorized party gains access to certain systems in relation to an authorized party. This can happen in many ways, including piggybacking on public wireless networks and piggybacking in a password-protected system.
Example : Suppose one authorized person enter in one building and he/she has entry pass for enter but that authorized person friend have no entry pass but he/she take support his friend and enter building without pass.
Transformation Factor :
1. Rephrase each definition in your own words Salami shaving Manipulating programs or data in order...