Question: Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used

Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not atall.
Match the computer fraud and abuse technique in the left

1. Chipping a. llegally obtaining confidential information, such as a Social Security number, about another can be used for financial gain person so that it 2. Data diddlingb. Scarching through garbage for confidential data 3. Data leakage c. Covertly swiping a credit card in a card reader that re- cords the data for later use 4. Identity thef d. Embezzling sma fractions of funds over time 5. Round-down e. Inserting a chip that captures financial data in a legiti fraud mate credit card reader 6. Salami technique f. Copying company data, such as computer files, with- out g. Concealing data within a large MP3 file h. Use of spyware to record a user's keystrokes i. Altering data before or during entry into a computer perimisSion 7. Scavenging system j. Placing truncated decimal places in an account con trolled by the perpetrator

Step by Step Solution

3.60 Rating (168 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

1 Chipping e Inserting a chip that captures financial data in a ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

373-B-A-I-S (4829).docx

120 KBs Word File

Students Have Also Explored These Related Accounting Questions!