Problem

Computer Fraud and Abuse Techniques.Match the computer fraud and abuse technique in the le...

Computer Fraud and Abuse Techniques.

Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not at all.

___ 1. Dictionary attack

a. Special software used to bypass system controls

___ 2. Hacking

b. A segment of executable code that attaches itself to software

___ 3. Logic bomb

c. Capturing and decrypting passwords to gain access to a system

___ 4. Malware

d. Malicious computer code that specifically targets a computer’s start-up instructions

___ 5. Masquerading

e. Using a wireless network without permission

___ 6. Password cracking

f. Covertly swiping a credit card in a card reader that records the data for later use

___ 7. Piggybacking

g. Concealing data within a large MP3 file

___ 8. Posing

h. Attack occurring between the discovery of a software vulnerability and the release of a patch to fix the problem

___ 9. Pretexting

i. Entering a system using a back door that bypasses normal system controls

___ 10. Rootkit

j. Using software to guess company addresses, send employees blank e-mails, and add unreturned messages to spammer e-mail lists

___ 11. Shoulder surfing

k. Unauthorized code in an authorized and properly functioning program

___ 12. Skimming

l. Software used to do harm

___ 13. Social engineering

m. A program that can replicate itself and travel over networks

___ 14. Software piracy

n. Pretending to be a legitimate user, thereby gaining access to a system and all the rights and privileges of the legitimate user

___ 15. Steganography

o. Special code or password that bypasses security features

___ 16. Superzapping

p. Unauthorized copying or distribution of copyrighted software

___ 17. Trap door

q. Software that conceals processes, files, network connections, and system data from the operating system and other programs

___ 18. Trojan horse

r. Methods used to trick someone into divulging personal information

___ 19. Virus

s. Software that sits idle until a specified circumstance or time triggers it

___ 20. Worm

t. The act of duplicating software, music, or movies

___ 21. Zero-day attack

u. Acting under false pretenses to gain confidential information

 

v. Observing or listening to users as they divulge personal information

 

w. Gaining access to a computer system without permission

 

x. Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the item sold

Step-by-Step Solution

Request Professional Solution

Request Solution!

We need at least 10 more requests to produce the solution.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the solution will be notified once they are available.
Add your Solution
Textbook Solutions and Answers Search
Solutions For Problems in Chapter 5