Computer Fraud and Abuse Techniques.
Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not at all.
___ 1. Address Resolution Protocol (ARP) spoofing | a. Inserting a sleeve to trap a card in an ATM, pretending to help the owner to obtain his PIN, and using the card and PIN to drain the account |
___ 2. Buffer overflow attack | b. A segment of executable code that attaches itself to software |
___ 3. Carding | c. Using a small storage device to download unauthorized data from a computer |
___ 4. Caller ID spoofing | d. Malicious computer code that specifically targets a computer’s start-up instructions |
___ 5. Cyber-extortion | e. Malicious software that people are frightened into buying |
___ 6. Cyber-bullying | f. Covertly swiping a credit card in a card reader that records the data for later use |
___ 7. Economic espionage | g. Using the Internet to inflate a stock price so it can be sold for a profit |
___ 8. E-mail spoofing | h. Exchanging explicit messages and pictures by telephone |
___ 9. IP address spoofing | i. Inserting a malicious database query in input in a way that it can be executed by an application program |
___ 10. Internet auction fraud | j. So much input data that storage is exceeded; excess input contains code that takes control of the computer |
___ 11. Internet pumpand-dump fraud | k. Making an electronic communication appear as though it originated from a different source |
___ 12. Lebanese looping | l. Creating packets with a forged address to impersonate another computing system |
___ 13. Man-in-themiddle (MITM) attack | m. Fake computer networking protocol messages sent to an Ethernet LAN to determine a network host’s hardware address when only its IP address is known |
___ 14. Podslurping | n. Changing the name or number a text message appears to come from |
___ 15. Ransomware | o. Special code or password that bypasses security features |
___ 16. Scareware | p. A link containing malicious code that takes a victim to a vulnerable website where the victim’s browser executes the malicious code embedded in the link |
___ 17. Sexting | q. Using social networking to harass another person |
___ 18. SQL injection | r. Displaying an incorrect phone number to hide the caller’s identity |
___ 19. SMS spoofing | s. Software that encrypts programs and data until a payment is made to remove it |
___ 20. XSS attack | t. A hacker placing himself between a client and a host to intercept network traffic |
___ 21. Tabnapping | u. A demand for payment to ensure a hacker does not harm a computer |
v. Theft of trade secrets and intellectual property | |
w. Using a site that sells to the highest bidder to defraud another person | |
x. Verifying credit card validity | |
y. Secretly changing an already open browser tab |
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.