Question: Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used
.png)
1. Dictionary attack a Spcal software used to bypass system controls 2. Hacking b. A segment of executable code that attaches itself to software 3. Logic bombc. Capturing and decrypting passwords to gain access to a system 4. Malware d. Malicious computer code that specifically targets a 5. Masquerading 6. Password cracking computer's start-up instructions e. Using a wireless network without permission f. Covertly swiping a credit card in a card reader that re- 7. Piggybacking . Posing cords the data for later use g. Concealing data within a large MP3 file h. Attack occurring between the discovery of a software vulnerability and the release of a patch to fix the problem Entering a system using a back door that bypasses normal system controls Using software to guess company addresses, send employees blank e-mails, and add unreturned mes sages to spammer e-mail lists 9. Pretexting i. I0. Rootkit j. 11. Shoulder surfing k Unauthorized code in an authorized and properly 12. Skimming 13. Social engineering 14. Software piracy functioning program Software used to do harm 1. m. A program that can replicate itself and travel over networks n. Pretending to be a legitimate user, thereby gaining ac cess to a system and all the rights and privileges of the legitimate user 15. Steganography 16. Superzapping o. Special code or password that bypasses security features p. Unauthorized copying or distribution of copyrighted software 17. Trap door q. Software that conceals processes, files, network con nections, and system data from the operating system and other programs 18. Trojan e . Methods used to trick someone into divulging personal information 19. Virus s. Software that sits idle until a specified circumstance or time triggers it 20. Worm t. The act of duplicating software, music, or movies 21. Zero-day attack Acting under false pretenses to gain confidential information v. Observing or listening to users as they divulge personal information w. Gaining access to a computer system without permission x. Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the item sold
Step by Step Solution
3.47 Rating (163 Votes )
There are 3 Steps involved in it
1 Dictionary attack j Using software to guess company addresses send them blank emails and adding un... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
373-B-A-I-S (4830).docx
120 KBs Word File
