Question: Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used
.png)
1. Chipping a. llegally obtaining confidential information, such as a Social Security number, about another can be used for financial gain person so that it 2. Data diddlingb. Scarching through garbage for confidential data 3. Data leakage c. Covertly swiping a credit card in a card reader that re- cords the data for later use 4. Identity thef d. Embezzling sma fractions of funds over time 5. Round-down e. Inserting a chip that captures financial data in a legiti fraud mate credit card reader 6. Salami technique f. Copying company data, such as computer files, with- out g. Concealing data within a large MP3 file h. Use of spyware to record a user's keystrokes i. Altering data before or during entry into a computer perimisSion 7. Scavenging system j. Placing truncated decimal places in an account con trolled by the perpetrator
Step by Step Solution
3.60 Rating (168 Votes )
There are 3 Steps involved in it
1 Chipping e Inserting a chip that captures financial data in a ... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
373-B-A-I-S (4829).docx
120 KBs Word File
