Problem

Computer Fraud and Abuse Techniques.Match the computer fraud and abuse technique in the le...

Computer Fraud and Abuse Techniques.

Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not at all.

___ 1. Bluebugging

a. Intercepting Internet and other network transmissions

___ 2. Bluesnarfing

b. E-mails instructing a user to call a phone number where they are asked to divulge personal information

___ 3. Eavesdropping

c. Searching for unprotected wireless networks in a vehicle

___ 4. Evil twin

d. Gaining access to a protected system by latching onto a legitimate user

___ 5. Packet sniffing

e. Decoding and organizing captured network data

___ 6. Phreaking

f. Intercepting and/or listening in on private voice and data transmissions

___ 7. Piggybacking

g. Deep packet filtering

___ 8. Vishing

h. Searching for modems on unprotected phone lines in order to access the attached computer and gain access to the network(s) to which it is attached

___ 9. War dialing

i. Making phone calls and sending text messages using another user’s phone without physically holding that phone

___ 10. War driving

j. Using telephone lines to transmit viruses and to access, steal, and destroy data

 

k. Capturing data from devices that use Bluetooth technology

 

l. Devices that hide IP addresses

 

m. A rogue wireless access point masquerading as a legitimate access point

Step-by-Step Solution

Request Professional Solution

Request Solution!

We need at least 10 more requests to produce the solution.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the solution will be notified once they are available.
Add your Solution
Textbook Solutions and Answers Search
Solutions For Problems in Chapter 6