Question: Part III: Matching (45 points) Match the items below with their applications 26. Pretexting 27. Hacking 28. Password cracking 29. Salami technique 30. Cyber-extortion 31.

 Part III: Matching (45 points) Match the items below with their

applications 26. Pretexting 27. Hacking 28. Password cracking 29. Salami technique 30.

Part III: Matching (45 points) Match the items below with their applications 26. Pretexting 27. Hacking 28. Password cracking 29. Salami technique 30. Cyber-extortion 31. Trojan horse 32. Scareware 33. Social engineering 34. Vishing A man accessed millions of ChoicePoint files by claiming in writing and on the phone to be someone he was not. A. rs who opened the attachments unknowingly unleashed a program hidden inside another program that secretly copied the subscriber's account name and passwor forwarded them to the sender B. America Online subscribers received a message offering free software. Use d and C. Robert Thousand, Jr. discovered he lost $400,000 from his Ameritrade retirement account shortly after he began receiving a flood of phone calls with a 30-second recording for a sex hotline. An FBI investigation revealed that the perpetrator obtained his Ameritrade account information, called Ameritrade to change his phone number, created several VolP accounts, and used automated dialing tools to flood the dentist's phones in case Ameritrade called his real number. The perpetrator requested multiple monetary transfers, but Ameritrade would not process them until they reached Thou called Ameritrade, gave information to been having phone troubles, and told Ameritrade he was not happy that the transfers had not gone through. Ameritrade processed the transfers, and Thousand lost $400,000. sand to verify them. When the transfers did not go through, the attacker verify that he was Thousand, claimed he had D. Microsoft filed a lawsuit against two Texas firms that produced software that sent "CRITICAL incessant pop-ups resembling system warnings. The messages stated ERROR MESSAGE! REGISTRY DAMAGED AND CORRUPTED" and instructed to visit a Web site to download Registry Cleaner XP at a cost of $39.95 E. Daniel Baas was the systems administrator for a company that did business with Acxiom, who manages customer information for companies. Baas exceederd authorized access and downloaded a file with 300 encrypted passwords, decrypted the password file, and downloaded Acxiom customer files containing perso information. The intrusion cost Acxiom over $5.8 million. executives of a rern franchise modified a computer-billing program to add five gallons to the act AB. A federal grand jury in Fort Lauderdale claimed that four ex to the actual gas tank capacity of their vehicles. Over three years, 47,000 customers who returned a car without topping it off ended up paying an extra $2 to $15 for gasoline. AC. A teenage gang known as the "414s" broke into the Los Alamos National Laboratory, Sloan-Kettering Cancer Center, and Security Pacific Bank. One gang member appeared in Newsweek with the caption "Beware: Hackers at play." AD. In an economic stimulus scam, individuals receive a phone call from President Obama telling them to go to a Web site to apply for the funds. To receive the stimulus money, victims have to enter personal identification information, complete an online application, and pay a $28 fee. AE. MicroPatent, an intellectual property firm, was notified that their proprietary information would be broadcast on the Internet if they did not pay a $17 million fee. The hacker was caught by the FBI before any damage was done. Part III: Matchine (30 noiutu

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Finance Questions!