Question: QUESTION 1 6 - ( Please see the picture below ) Below are several types of computer fraud and abuses. Match each fraud / abuse
QUESTION Please see the picture below
Below are several types of computer fraud and abuses. Match each fraudabuse to the appropriate example or definition. Note that a component may be used more than once or not all.
consists of the unauthorized copying of company data.
A hijacking
A hacker who changed the voice mail greeting of a company to say that it is offering free products by
B phreaking
asking customers to dial a different phone number to claim their gifts is engaging in
Gaining control of somebody's computer without their knowledge and using it to carry out illicit
activities is known as
reating a seemingly legitimate business, collecting personal data while making a sale, and never
delivering items sold is known as
Sending an unsolicited message to many people at the same time is known as
Unauthorized access, modification, or use of an electronic device or some element of a computer
system is known as
C posing
D salami
E hacking
F Trojan horse
G data leakage
Hspamming
I. trap door
A fraud technique that slices off tiny amounts from many projects is called the
technique.
J maninthemiddle
A fraud technique that uses a back door into a system that bypasses normal system controls is called
the technique.
A fraud technique that uses unauthorized codes in an authorized and properly functioning program
is called the
technique.
A fraud technique that allows a hacker to place himself or herself between a client and a host to
intercept network traffic is called the
technique.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
