Problem

Computer Fraud and Abuse Techniques.Match the computer fraud and abuse technique in the le...

Computer Fraud and Abuse Techniques.

Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not at all.

___ 1. Chipping

a. Illegally obtaining confidential information, such as a Social Security number, about another person so that it can be used for financial gain

___ 2. Data diddling

b. Searching through garbage for confidential data

___ 3. Data leakage

c. Covertly swiping a credit card in a card reader that records the data for later use

___ 4. Identity theft

d. Embezzling small fractions of funds over time

___ 5. Round-down fraud

e. Inserting a chip that captures financial data in a legitimate credit card reader

___ 6. Salami technique

f. Copying company data, such as computer files, without permission

___ 7. Scavenging

g. Concealing data within a large MP3 file

 

h. Use of spyware to record a user’s keystrokes

 

i. Altering data before or during entry into a computer system

 

j. Placing truncated decimal places in an account controlled by the perpetrator

Step-by-Step Solution

Request Professional Solution

Request Solution!

We need at least 10 more requests to produce the solution.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the solution will be notified once they are available.
Add your Solution
Textbook Solutions and Answers Search
Solutions For Problems in Chapter 5