Computer Fraud and Abuse Techniques.
Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not at all.
___ 1. Chipping | a. Illegally obtaining confidential information, such as a Social Security number, about another person so that it can be used for financial gain |
___ 2. Data diddling | b. Searching through garbage for confidential data |
___ 3. Data leakage | c. Covertly swiping a credit card in a card reader that records the data for later use |
___ 4. Identity theft | d. Embezzling small fractions of funds over time |
___ 5. Round-down fraud | e. Inserting a chip that captures financial data in a legitimate credit card reader |
___ 6. Salami technique | f. Copying company data, such as computer files, without permission |
___ 7. Scavenging | g. Concealing data within a large MP3 file |
h. Use of spyware to record a user’s keystrokes | |
i. Altering data before or during entry into a computer system | |
j. Placing truncated decimal places in an account controlled by the perpetrator |
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.