Problem

Computer Fraud and Abuse Techniques.Match the computer fraud and abuse technique in the le...

Computer Fraud and Abuse Techniques.

Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not at all.

___ 1. Address Resolution Protocol (ARP) spoofing

a. Inserting a sleeve to trap a card in an ATM, pretending to help the owner to obtain his PIN, and using the card and PIN to drain the account

___ 2. Buffer overflow attack

b. A segment of executable code that attaches itself to software

___ 3. Carding

c. Using a small storage device to download unauthorized data from a computer

___ 4. Caller ID spoofing

d. Malicious computer code that specifically targets a computer’s start-up instructions

___ 5. Cyber-extortion

e. Malicious software that people are frightened into buying

___ 6. Cyber-bullying

f. Covertly swiping a credit card in a card reader that records the data for later use

___ 7. Economic espionage

g. Using the Internet to inflate a stock price so it can be sold for a profit

___ 8. E-mail spoofing

h. Exchanging explicit messages and pictures by telephone

___ 9. IP address spoofing

i. Inserting a malicious database query in input in a way that it can be executed by an application program

___ 10. Internet auction fraud

j. So much input data that storage is exceeded; excess input contains code that takes control of the computer

___ 11. Internet pumpand-dump fraud

k. Making an electronic communication appear as though it originated from a different source

___ 12. Lebanese looping

l. Creating packets with a forged address to impersonate another computing system

___ 13. Man-in-themiddle (MITM) attack

m. Fake computer networking protocol messages sent to an Ethernet LAN to determine a network host’s hardware address when only its IP address is known

___ 14. Podslurping

n. Changing the name or number a text message appears to come from

___ 15. Ransomware

o. Special code or password that bypasses security features

___ 16. Scareware

p. A link containing malicious code that takes a victim to a vulnerable website where the victim’s browser executes the malicious code embedded in the link

___ 17. Sexting

q. Using social networking to harass another person

___ 18. SQL injection

r. Displaying an incorrect phone number to hide the caller’s identity

___ 19. SMS spoofing

s. Software that encrypts programs and data until a payment is made to remove it

___ 20. XSS attack

t. A hacker placing himself between a client and a host to intercept network traffic

___ 21. Tabnapping

u. A demand for payment to ensure a hacker does not harm a computer

 

v. Theft of trade secrets and intellectual property

 

w. Using a site that sells to the highest bidder to defraud another person

 

x. Verifying credit card validity

 

y. Secretly changing an already open browser tab

Step-by-Step Solution

Request Professional Solution

Request Solution!

We need at least 10 more requests to produce the solution.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the solution will be notified once they are available.
Add your Solution
Textbook Solutions and Answers Search
Solutions For Problems in Chapter 6