Match the fraud and abuse technique in the left column with the scenario in the right column.
Question:
Transcribed Image Text:
1. Address Resolu a. Inserting a sleeve to trap a card in an ATM, pre- tion Protocol (ARP) spoofing tending to help the owner to obtain hs PIN, and using the card and PIN to drain the account A segment of executable code that attaches itself to 2. Buffer overflow b. attack software 3. Carding Using a small storage device to download unauthor- ized data from a computer c. 4. Caller ID d Malicious computer code that specifically targets a spoofing 5. Cyber-extortion e. Malicious software that people are frightened inteo 6. Cyber-bullying 7. Economic computer's start-up instructions buying cords the data for later use f. Covertly swiping a credit card in a card reader that re- g. Using the Internet to inflate a stock price so it can be h. Exchanging explicit messages and pictures by i. espionage sold for a profit 8. E-mail spoofing telephone Inserting a malicious database query in input in a way that it can be executed by an application program . IP address spooting 10. Internet auction j So much input data that storage is exceeded; fraud excess input contains code that takes control of the computer 1. Internet pump- k. Making an electronic communication appear as thougl and-dump fraud it originated from a different source 12. Lebanese looping . Creating packets with a forged address to impersonate 13. Man-in-the- another computing system m. Fake computer networking protocol messages middle (MITM) attack sent to an Ethernet LAN to determine a network host's hardware address when only its IP address is known 14. Podslurping 15. Ransomware. Special code or password that bypasses security 16. Scareware n. Changing the name or number a text message appears to come from features p. A link containing malicious code that takes a victim to a vulnerable website where the victim's browser executes the malicious code embedded in the link 17. Sexting 18. SQL injection . Displaying an incorrect phone number to hide the 19. SMS spooing s. Software that encrypts programs and data until a pay 20. XSS attack q. Using social networking to harass another person caller's identity ment is made to remove it A hacker placing himself between a client and a host t. to intercept network traftic 21. Tabnapping . A demand for payment to ensure a hacker does not harm a computer V. Theft of trade secrets and intellectual property w. Using a site that sells to the highest bidder to defraud another person x. Verifying credit card validity y. Secretly changing an already open browser tab
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 61% (13 reviews)
1Address Resolution Protocol ARP spoofing mFake computer networking protocol messages sent to an Ethernet LAN to determine a network hosts hardware ad...View the full answer
Answered By
Patrick Busaka
I am a result oriented and motivated person with passion for challenges because they provide me an opportunity to grow professionally.
5.00+
38+ Reviews
58+ Question Solved
Related Book For
Accounting Information Systems
ISBN: 978-0133428537
13th edition
Authors: Marshall B. Romney, Paul J. Steinbart
Question Posted:
Students also viewed these Accounting questions
-
Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not atall. 1. Bluebugging 2. Bluesnarfing...
-
Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not atall. 1. Chipping a. llegally...
-
Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not atall. 1. Dictionary attack a Spcal...
-
PERCH FALLS MINRO HOCKEY ASSOCIATION FUND Operating Capital Endowment Cash Inflows: Government grant for operating Costs $162 Government grant for hockey arena $350 Corporate donations for hockey...
-
Fabrication Holdings Ltd. (FH) has been a client of KFP Partners for many years. You are an audit senior and have been assigned to the FH audit for the first time for the financial year ending...
-
Yeager Corporation was organized in January 2009. During 2009, Yeager engaged in the following stockholders' equity activities: a. Secured approval for a corporate charter that authorizes Yeager to...
-
As the brick in Example 9.8 moves downward, why is the magnitude of the force it exerts on the spring given by Eq. 1 in Example 9.8 and not by simply the magnitude \(m g\) of the gravitational force...
-
Ehler Corporation sells rock-climbing products and also operates an indoor climbing facility for climbing enthusiasts. During the last pan of 2017, Ehler had the following transactions related to...
-
19 20 Assertion A compass needle is placed near a current carrying wire. The deflection of the compass needle decreases when the magnitude of the current in the wire is increased. Reason The strength...
-
In the Illustrative Case in this chapter, payroll transactions for Brookins Company were analyzed, journalized, and posted for the third quarter of the fiscal year. In this problem, you are to record...
-
Match the Internet-related computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not atall. 1. Adware a....
-
Identify the computer fraud and abuse technique used in each the following actual examples of computer wrongdoing. a. A teenage gang known as the 414s broke into the Los Alamos National Laboratory,...
-
All the resistors in Fig. 25.24 have the same resistance. In which circuits does the battery supply the same current? (a) (b) Lww- ww (c) (d) FIGURE 25.24 For Thought and Discussion 2 ww ww ww
-
A closed vessel of \(0.15 \mathrm{~m}^{3}\) capacity contains a mixture of methane \(\left(\mathrm{CH}_{4} ight)\) and air, the air being \(20 \%\) in excess of that required for chemically correct...
-
A gas injection system supplies a mixture of propane \(\left(\mathrm{C}_{3} \mathrm{H}_{8} ight)\) and air to a spark-ignition engine, in the ratio of volumes of 1:30. The mixture is trapped at \(1...
-
How can the equation of state in the form of a relationship between pressure, volume and temperature be used to extend limited data on the entropy of a substance. A certain gas, A, has the equation...
-
A mixture of one part by volume of vapourised benzene to 50 parts by volume of air is ignited in a cylinder and adiabatic combustion ensues at constant volume. If the initial pressure and temperature...
-
A mixture containing equal volumes of carbon dioxide \(\left(\mathrm{CO}_{2} ight)\) and hydrogen \(\left(\mathrm{H}_{2} ight)\) is contained in a rigid vessel. It is ignited at \(60^{\circ}...
-
In the following problems, the data table contains various modifications that could be made to the MIPS instruction set architecture. You will investigate the impact of these changes on the...
-
Figure displays a 12.0 V battery 3 four uncharged capacitors of capacitances C1 = 4.00F, C2 = 6.00F, and C3 = 3.00F. The switch is thrown to the left side until capacitor 1 is fully charged. Then the...
-
Bickchips cash-fl ow-based accruals ratio in 2020 is closest to: A . 9.9%. B . 13.4%. C . 23.3%.
-
The chapter suggested that it is important to design the format of a report before creating the report itself. Do you agree with this suggestion? Why or why not?
-
Do you think that we will still use hardcopy reports in the future, or will they be replaced with softcopy ones? Defend your answer.
-
Would you rather use the Report Wizard to create the format of a report or design one yourself from scratch? Why?
-
For her dissertation, Catherine wanted to study the role of women in management positions in organisations. In particular, she was interested in difficulties women experience in management positions....
-
Hattersley Electrics is a division of the Hattersley Group PLC, a United Kingdom based manufacturing conglomerate whose main markets were, until recently, the high tech aerospace and the defence...
-
The Town Manager has asked you to organize a Local Emergency Action Planning Committee (LEAPC), Who do we Invite? Lets open the discussion up to who we might what to invite and why?
Study smarter with the SolutionInn App