Match the computer fraud and abuse technique in the left column with the scenario in the right
Question:
Transcribed Image Text:
1. Dictionary attack a Spcal software used to bypass system controls 2. Hacking b. A segment of executable code that attaches itself to software 3. Logic bombc. Capturing and decrypting passwords to gain access to a system 4. Malware d. Malicious computer code that specifically targets a 5. Masquerading 6. Password cracking computer's start-up instructions e. Using a wireless network without permission f. Covertly swiping a credit card in a card reader that re- 7. Piggybacking . Posing cords the data for later use g. Concealing data within a large MP3 file h. Attack occurring between the discovery of a software vulnerability and the release of a patch to fix the problem Entering a system using a back door that bypasses normal system controls Using software to guess company addresses, send employees blank e-mails, and add unreturned mes sages to spammer e-mail lists 9. Pretexting i. I0. Rootkit j. 11. Shoulder surfing k Unauthorized code in an authorized and properly 12. Skimming 13. Social engineering 14. Software piracy functioning program Software used to do harm 1. m. A program that can replicate itself and travel over networks n. Pretending to be a legitimate user, thereby gaining ac cess to a system and all the rights and privileges of the legitimate user 15. Steganography 16. Superzapping o. Special code or password that bypasses security features p. Unauthorized copying or distribution of copyrighted software 17. Trap door q. Software that conceals processes, files, network con nections, and system data from the operating system and other programs 18. Trojan e . Methods used to trick someone into divulging personal information 19. Virus s. Software that sits idle until a specified circumstance or time triggers it 20. Worm t. The act of duplicating software, music, or movies 21. Zero-day attack Acting under false pretenses to gain confidential information v. Observing or listening to users as they divulge personal information w. Gaining access to a computer system without permission x. Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the item sold
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 78% (14 reviews)
1 Dictionary attack j Using software to guess company addresses send them blank emails and adding un...View the full answer
Answered By
Sheikh Muhammad Ibrahim
During the course of my study, I have worked as a private tutor. I have taught Maths and Physics to O'Level and A'Level students, as well as I have also taught basic engineering courses to my juniors in the university. Engineering intrigues me alot because it a world full of ideas. I have passionately taught students and this made me learn alot. Teaching algebra and basic calculus, from the very basics of it made me very patient. Therefore, I know many tricks to make your work easier for you. I believe that every student has a potential to work himself. I am just here to polish your skills. I am a bright student in my university. My juniors are always happy from me because I help in their assignments and they are never late.
4.90+
14+ Reviews
24+ Question Solved
Related Book For
Accounting Information Systems
ISBN: 978-0133428537
13th edition
Authors: Marshall B. Romney, Paul J. Steinbart
Question Posted:
Students also viewed these Accounting questions
-
Match the Internet-related computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not atall. 1. Adware a....
-
Match the terms in the left column with their appropriate definition in the rightcolumn. Terms Definitions 1. Economic order quantity a. A document that creates a legal ob EOO) ligation to buy and...
-
Match the terms in the left column with their definitions from the right column: Column A 1. Bill of materials 2. Operations list 3. Master Production Schedule 4. Lean manufacturing 5. Production...
-
1. (Adverse Selection) Consider a labor market model with many identical firms hiring workers. The firms produce a homogeneous product with a constant-returns-to-scale technology and act as price...
-
Fellowes and Associates Chartered Accountants is a successful mid-tier accounting firm with a large range of clients across Canada. In 2011, Fellowes and Associates gained a new client, Health Care...
-
Carriage Way was a real estate development of approximately 80 houses and 132 apartments. The property owners were members of the Carriage Way Property Owners Association. Each year, the association...
-
Briefly explain the difference between accounting, finance, and engineering economics. Try to put the concepts in your own (or your team's) words and compare the concepts where appropriate.
-
Hawkeye Networks is a U.S. corporation with no foreign-source income of its own, but it does have wholly owned subsidiaries in Korea and Singapore. The Korean subsidiary has $43 million of pre-tax...
-
Oriole Manufacturing's sales decreased significantly in 2021 due to increased online purchasing. The company's income statement showed the following results from selling 386,000 units of product: Net...
-
Case Study: star struck Iridium is named after the 77th element to signify the 77 satellites that were supposed to beam signals around the world, creating a worldwide mobile satellite telephone...
-
Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not atall. 1. Chipping a. llegally...
-
Match the fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not atall. 1. Address Resolu a. Inserting a sleeve...
-
An ideal diesel engine has a compression ratio of 20 and uses air as the working fluid. The state of air at the beginning of the compression process is 95 kPa and 20C. If the maximum temperature in...
-
Eagles Inc is a new start up . During their first year of operations, they agreed to provide their employees with 2 hour of vacation for every 4 0 hours worked. Vacation vests immediately ( cannot be...
-
2 . Husband ( H ) and Wife ( W ) are both lawyers and practice law together. In each of the following alternatives, please determine if they are entitled to QBD for 2 0 2 2 and, if so , in what...
-
Geyser Manufacturing replaced its hourly quality inspectors with a computerized inspection system. What will be the impact of this choice on the company's degree of operating leverage?
-
Give the prime-power factorization of each of these numbers. (a) 15 (b) 3375 (a) The prime-power factorization of 15 is (c) 37,000
-
Why should or shouldn't Zayna charge her father for his and her brother's phone use? What potential goals or purposes might she have for charging her father? Which reasons are the most pertinent?
-
In Exercises 716, evaluate the limit. 9x-2 lim X06-29x
-
Assume Eq. 6-14 gives the drag force on a pilot plus ejection seat just after they are ejected from a plane traveling horizontally at 1300 km/h. Assume also that the mass of the seat is equal to the...
-
Th e cash-fl ow-based accruals ratios from 2018 to 2020 indicate: A . improving earnings quality. B . deteriorating earnings quality. C . no change in earnings quality.
-
What is the difference between sorting records and indexing records in a database?
-
What is data mining? How is data mining useful to profit-seeking companies? What are some accounting uses of data mining?
-
What are object-oriented databases? What are multimedia databases? How are these two types of databases alike? How are they different?
-
The following information is available for ADT Company, which produces special-order security produc order costing system. Overhead is applied using a predetermined overhead rate of 55% of direct...
-
Stahelin Valves produces a single component, a valve. The valve sells for $43 per unit. Fixed costs are $1,605,000 annually. Production and sales of 407,000 units annually results in profit before...
-
Calaveras Tire exchanged equipment for two pickup trucks. The book value and fair value of the equipment given up were $29,000 (original cost of $78,500 less accumulated depreciation of $49,500) and...
Study smarter with the SolutionInn App