Problem

Computer Fraud and Abuse Techniques.Match the Internet-related computer fraud and abuse te...

Computer Fraud and Abuse Techniques.

Match the Internet-related computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not at all.

___ 1. Adware

a. Software that monitors and reports a user’s computing habits

___ 2. Botnet

b. A program stored in a web page that is executed by a web browser

___ 3. Bot herder

c. Sending an e-mail instructing the recipient to do something or else suffer adverse consequences

___ 4. Click fraud

d. Using the Internet to pass off the work of another as your own

___ 5. DoS

e. E-mailing an unsolicited message to many people at the same time

___ 6. E-mail threats

f. Creating websites with names similar to real websites so users making errors while entering a website name are sent to a hacker’s site

___ 7. Hijacking

g. An e-mail warning regarding a virus that, in reality, does not exist

___ 8. Internet misinformation

h. A spam blog that promotes affiliated websites to increase their Google PageRank

___ 9. Internet terrorism

i. Software that collects consumer surfing and purchasing data

___ 10. Key logger

j. E-mails that look like they came from a legitimate source but are actually from a hacker who is trying to get the user to divulge personal information

___ 11. Pharming

k. Making an e-mail look like it came from someone else

___ 12. Phishing

l. Gaining control of a computer to carry out unauthorized illicit activities

___ 13. Spamming

m. Using the Internet to disrupt communications and e-commerce

___ 14. Splog

n. Diverting traffic from a legitimate website to a hacker’s website to gain access to personal and confidential information

___ 15. Spyware

o. A network of hijacked computers

___ 16. Spoofing

p. Using a legion of compromised computers to launch a coordinated attack on an Internet site

___ 17. Typosquatting

q. Use of spyware to record a user’s keystrokes

 

r. Hackers that control hijacked computers

 

s. Circulating lies or misleading information using the world’s largest network

 

t. Overloading an Internet service provider’s e-mail server by sending hundreds of e-mail messages per second from randomly generated false addresses

 

u. Inflating advertising revenue by clicking online ads numerous times

Step-by-Step Solution

Request Professional Solution

Request Solution!

We need at least 10 more requests to produce the solution.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the solution will be notified once they are available.
Add your Solution
Textbook Solutions and Answers Search
Solutions For Problems in Chapter 5