Computer Fraud and Abuse Techniques.
Match the Internet-related computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not at all.
___ 1. Adware | a. Software that monitors and reports a user’s computing habits |
___ 2. Botnet | b. A program stored in a web page that is executed by a web browser |
___ 3. Bot herder | c. Sending an e-mail instructing the recipient to do something or else suffer adverse consequences |
___ 4. Click fraud | d. Using the Internet to pass off the work of another as your own |
___ 5. DoS | e. E-mailing an unsolicited message to many people at the same time |
___ 6. E-mail threats | f. Creating websites with names similar to real websites so users making errors while entering a website name are sent to a hacker’s site |
___ 7. Hijacking | g. An e-mail warning regarding a virus that, in reality, does not exist |
___ 8. Internet misinformation | h. A spam blog that promotes affiliated websites to increase their Google PageRank |
___ 9. Internet terrorism | i. Software that collects consumer surfing and purchasing data |
___ 10. Key logger | j. E-mails that look like they came from a legitimate source but are actually from a hacker who is trying to get the user to divulge personal information |
___ 11. Pharming | k. Making an e-mail look like it came from someone else |
___ 12. Phishing | l. Gaining control of a computer to carry out unauthorized illicit activities |
___ 13. Spamming | m. Using the Internet to disrupt communications and e-commerce |
___ 14. Splog | n. Diverting traffic from a legitimate website to a hacker’s website to gain access to personal and confidential information |
___ 15. Spyware | o. A network of hijacked computers |
___ 16. Spoofing | p. Using a legion of compromised computers to launch a coordinated attack on an Internet site |
___ 17. Typosquatting | q. Use of spyware to record a user’s keystrokes |
r. Hackers that control hijacked computers | |
s. Circulating lies or misleading information using the world’s largest network | |
t. Overloading an Internet service provider’s e-mail server by sending hundreds of e-mail messages per second from randomly generated false addresses | |
u. Inflating advertising revenue by clicking online ads numerous times |
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.