Question: Case 9 Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may

  • Case 9 Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not at all. 1. Dictionary attack j. Using software to guess company addresses, send them blank emails, and adding unreturned messages to spammer e-mail lists. 2. Hacking w. Gaining access to a computer system without permission. 3. Logic bomb s. Software that sits idle until a specified circumstance or time triggers it. 4. Malware l. Software used to do harm. 5. Masquerading n. Pretending to be a legitimate user, thereby gaining access to a system and all the rights and privileges of the legitimate user. 6. Password cracking c. Capturing and decrypting passwords to gain access to a system. 7. Piggybacking e. Using a wireless network without permission. 8. Posing x. Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the item sold. 9. Pretexting u. Acting under false pretenses to gain confidential information. 10. Rootkit q. Software that conceals processes, files, network connections, and system data from the operating system and other programs. 11. Shoulder surfing v. Observing or listening to users as they divulge personal information. 12. Skimming f. Covertly swiping a credit card in a card reader that records the data for later use. 13. Social engineering r. Methods used to trick someone into divulging personal information. 14. Software piracy p. Unauthorized copying or distribution of copyrighted software. 15. Steganography g. Concealing data within a large MP3 file. 16. Superzapping a. Special software used to bypass system controls. 17. Trap door i. Entering a system using a back door that bypasses normal system controls. 18. Trojan horse k. Unauthorized code in an authorized and properly functioning program. 19. Virus b. A segment of executable code that attaches itself to software. 20. Worm m. A program that can replicate itself and travel over networks. 21. Zero-day attack h. Attack between the time a software vulnerability is discovered and a patch to fix the problem is released.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!