SlideShare a Scribd company logo
1 of 1
Download to read offline
9.4 Computer Fraud and Abuse Techniques. Match the Internet-related computer fraud and
abuse technique in the left column with the scenario in the right column. The scenarios on the
right may be used once, more than once, or not at all. 1. adware a. Software that monitors and
reports a user's computing habits 2. botnet b. A program stored in a web page and executed by a
web browser 3. bot herder c. Sending an e-mail instructing the recipient to do something or else
suffer adverse consequences 4. click fraud d. Using the Internet to pass off the work of another
as your own 5. DoS e. E-mailing an unsolicited message to many people at the same time
f. Creating websites with names similar to real websites so users making errors while entering a
website name are sent to a hacker's site g. An e-mail warning regarding a virus that in reality
does not exist
h. A spam blog that promotes atfiliated websites to increase their Google PageRank i. Software
that collects consumer surfing and purchasing data j. E-mails that look like they came from a
legitimate source but are actually from a hacker who is trying to get the user to divulge personal
information k. Making an e-mail look like it came from someone else 1. Gaining control of a
computer to carry out unauthorized illicit activities m. Using the Internet to disrupt
communications and ecommerce
n. Diverting traffic from a legitimate website to a hacker's website to gain access to personal and
confidential information o. A network of hijacked computers p. Using a legion of compromised
computers to launch a coordinated attack on an Internet site q. Use of spyware to record a user's
keystrokes r. Hackers that control hijacked computers s. Circulating lies or misleading
information using the world's largest network
t. Overloading an Internet service provider's e-mail server by sending hundreds of e-mail
messages per second from randomly generated false addresses u. Inflating advertising revenue
by clicking online ads numerous times

More Related Content

Similar to 9.4 Computer Fraud and Abuse Techniques. Match the Internet-relat.pdf

cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdfgaherwarsaloni1234
 
A software designer has realized that a soon-to-be released vers
A software designer has realized that a soon-to-be released versA software designer has realized that a soon-to-be released vers
A software designer has realized that a soon-to-be released verslatashiadegale
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptxImXaib
 
Phishing & spamming
Phishing & spammingPhishing & spamming
Phishing & spammingKavis Pandey
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and historygururaj lulkarni
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Jay Visavadiya
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfAadil83
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdfvinayakjadhav94
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"dogallama
 

Similar to 9.4 Computer Fraud and Abuse Techniques. Match the Internet-relat.pdf (20)

cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
A software designer has realized that a soon-to-be released vers
A software designer has realized that a soon-to-be released versA software designer has realized that a soon-to-be released vers
A software designer has realized that a soon-to-be released vers
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Phishing & spamming
Phishing & spammingPhishing & spamming
Phishing & spamming
 
Seminar
SeminarSeminar
Seminar
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdf
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER2000.pptx
CYBER2000.pptxCYBER2000.pptx
CYBER2000.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"
 
cybercreme.pptx
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
 

More from atc71jaipur

7. (i) Define band-limited bandpass process and draw its power spectr.pdf
 7. (i) Define band-limited bandpass process and draw its power spectr.pdf 7. (i) Define band-limited bandpass process and draw its power spectr.pdf
7. (i) Define band-limited bandpass process and draw its power spectr.pdfatc71jaipur
 
7. Consider using in place (i.e. no extra space used) quicksort and.pdf
 7. Consider using in place (i.e. no extra space used) quicksort and.pdf 7. Consider using in place (i.e. no extra space used) quicksort and.pdf
7. Consider using in place (i.e. no extra space used) quicksort and.pdfatc71jaipur
 
7. Initially, GDP is $10 billion. Consumers suddenly become worried a.pdf
 7. Initially, GDP is $10 billion. Consumers suddenly become worried a.pdf 7. Initially, GDP is $10 billion. Consumers suddenly become worried a.pdf
7. Initially, GDP is $10 billion. Consumers suddenly become worried a.pdfatc71jaipur
 
7. In its first four years of operations Peridot Jewelers reported th.pdf
 7. In its first four years of operations Peridot Jewelers reported th.pdf 7. In its first four years of operations Peridot Jewelers reported th.pdf
7. In its first four years of operations Peridot Jewelers reported th.pdfatc71jaipur
 
7. Shifts in production possibilities Suppose the fictional country o.pdf
 7. Shifts in production possibilities Suppose the fictional country o.pdf 7. Shifts in production possibilities Suppose the fictional country o.pdf
7. Shifts in production possibilities Suppose the fictional country o.pdfatc71jaipur
 
7) Assume that money demand is (MP)d=5Yi. Money supply is 1000 and .pdf
 7) Assume that money demand is (MP)d=5Yi. Money supply is 1000 and .pdf 7) Assume that money demand is (MP)d=5Yi. Money supply is 1000 and .pdf
7) Assume that money demand is (MP)d=5Yi. Money supply is 1000 and .pdfatc71jaipur
 
7. In a particular plant species, a particular locus on a chromosome .pdf
 7. In a particular plant species, a particular locus on a chromosome .pdf 7. In a particular plant species, a particular locus on a chromosome .pdf
7. In a particular plant species, a particular locus on a chromosome .pdfatc71jaipur
 
8. Individual and market demand Suppose that Brian and Crystal repres.pdf
 8. Individual and market demand Suppose that Brian and Crystal repres.pdf 8. Individual and market demand Suppose that Brian and Crystal repres.pdf
8. Individual and market demand Suppose that Brian and Crystal repres.pdfatc71jaipur
 
7. In Josef Toths famous diagram (below), why is water rising (again.pdf
 7. In Josef Toths famous diagram (below), why is water rising (again.pdf 7. In Josef Toths famous diagram (below), why is water rising (again.pdf
7. In Josef Toths famous diagram (below), why is water rising (again.pdfatc71jaipur
 
6. Bar eye in Drosophila is an X-linked characteristic in which bar e.pdf
 6. Bar eye in Drosophila is an X-linked characteristic in which bar e.pdf 6. Bar eye in Drosophila is an X-linked characteristic in which bar e.pdf
6. Bar eye in Drosophila is an X-linked characteristic in which bar e.pdfatc71jaipur
 
8) (Essay) Answer the following questions about Veblen (please provid.pdf
 8) (Essay) Answer the following questions about Veblen (please provid.pdf 8) (Essay) Answer the following questions about Veblen (please provid.pdf
8) (Essay) Answer the following questions about Veblen (please provid.pdfatc71jaipur
 
7. Which of the following statements about the U.S. Census is incorre.pdf
 7. Which of the following statements about the U.S. Census is incorre.pdf 7. Which of the following statements about the U.S. Census is incorre.pdf
7. Which of the following statements about the U.S. Census is incorre.pdfatc71jaipur
 
A manufacturing company that produces a single product has provided t.pdf
 A manufacturing company that produces a single product has provided t.pdf A manufacturing company that produces a single product has provided t.pdf
A manufacturing company that produces a single product has provided t.pdfatc71jaipur
 
A hypothetical population consists of eight individuals ages 13,14,17.pdf
 A hypothetical population consists of eight individuals ages 13,14,17.pdf A hypothetical population consists of eight individuals ages 13,14,17.pdf
A hypothetical population consists of eight individuals ages 13,14,17.pdfatc71jaipur
 
A European call option on a non-dividend-paying stock has a market pr.pdf
 A European call option on a non-dividend-paying stock has a market pr.pdf A European call option on a non-dividend-paying stock has a market pr.pdf
A European call option on a non-dividend-paying stock has a market pr.pdfatc71jaipur
 
A company based in the United Kingdom has an Italian subsidiary. The .pdf
 A company based in the United Kingdom has an Italian subsidiary. The .pdf A company based in the United Kingdom has an Italian subsidiary. The .pdf
A company based in the United Kingdom has an Italian subsidiary. The .pdfatc71jaipur
 
A contractors project being analyzed by PERT has an estimated time f.pdf
 A contractors project being analyzed by PERT has an estimated time f.pdf A contractors project being analyzed by PERT has an estimated time f.pdf
A contractors project being analyzed by PERT has an estimated time f.pdfatc71jaipur
 
8. A series of mutant strains (af) of a particular mold are not able .pdf
 8. A series of mutant strains (af) of a particular mold are not able .pdf 8. A series of mutant strains (af) of a particular mold are not able .pdf
8. A series of mutant strains (af) of a particular mold are not able .pdfatc71jaipur
 
6. Let X1,X2,�,Xn be iid RVs with mean and finite variance. What is .pdf
 6. Let X1,X2,�,Xn be iid RVs with mean  and finite variance. What is .pdf 6. Let X1,X2,�,Xn be iid RVs with mean  and finite variance. What is .pdf
6. Let X1,X2,�,Xn be iid RVs with mean and finite variance. What is .pdfatc71jaipur
 
A basic assumption of activity-based costing (ABC) is that All manufa.pdf
 A basic assumption of activity-based costing (ABC) is that All manufa.pdf A basic assumption of activity-based costing (ABC) is that All manufa.pdf
A basic assumption of activity-based costing (ABC) is that All manufa.pdfatc71jaipur
 

More from atc71jaipur (20)

7. (i) Define band-limited bandpass process and draw its power spectr.pdf
 7. (i) Define band-limited bandpass process and draw its power spectr.pdf 7. (i) Define band-limited bandpass process and draw its power spectr.pdf
7. (i) Define band-limited bandpass process and draw its power spectr.pdf
 
7. Consider using in place (i.e. no extra space used) quicksort and.pdf
 7. Consider using in place (i.e. no extra space used) quicksort and.pdf 7. Consider using in place (i.e. no extra space used) quicksort and.pdf
7. Consider using in place (i.e. no extra space used) quicksort and.pdf
 
7. Initially, GDP is $10 billion. Consumers suddenly become worried a.pdf
 7. Initially, GDP is $10 billion. Consumers suddenly become worried a.pdf 7. Initially, GDP is $10 billion. Consumers suddenly become worried a.pdf
7. Initially, GDP is $10 billion. Consumers suddenly become worried a.pdf
 
7. In its first four years of operations Peridot Jewelers reported th.pdf
 7. In its first four years of operations Peridot Jewelers reported th.pdf 7. In its first four years of operations Peridot Jewelers reported th.pdf
7. In its first four years of operations Peridot Jewelers reported th.pdf
 
7. Shifts in production possibilities Suppose the fictional country o.pdf
 7. Shifts in production possibilities Suppose the fictional country o.pdf 7. Shifts in production possibilities Suppose the fictional country o.pdf
7. Shifts in production possibilities Suppose the fictional country o.pdf
 
7) Assume that money demand is (MP)d=5Yi. Money supply is 1000 and .pdf
 7) Assume that money demand is (MP)d=5Yi. Money supply is 1000 and .pdf 7) Assume that money demand is (MP)d=5Yi. Money supply is 1000 and .pdf
7) Assume that money demand is (MP)d=5Yi. Money supply is 1000 and .pdf
 
7. In a particular plant species, a particular locus on a chromosome .pdf
 7. In a particular plant species, a particular locus on a chromosome .pdf 7. In a particular plant species, a particular locus on a chromosome .pdf
7. In a particular plant species, a particular locus on a chromosome .pdf
 
8. Individual and market demand Suppose that Brian and Crystal repres.pdf
 8. Individual and market demand Suppose that Brian and Crystal repres.pdf 8. Individual and market demand Suppose that Brian and Crystal repres.pdf
8. Individual and market demand Suppose that Brian and Crystal repres.pdf
 
7. In Josef Toths famous diagram (below), why is water rising (again.pdf
 7. In Josef Toths famous diagram (below), why is water rising (again.pdf 7. In Josef Toths famous diagram (below), why is water rising (again.pdf
7. In Josef Toths famous diagram (below), why is water rising (again.pdf
 
6. Bar eye in Drosophila is an X-linked characteristic in which bar e.pdf
 6. Bar eye in Drosophila is an X-linked characteristic in which bar e.pdf 6. Bar eye in Drosophila is an X-linked characteristic in which bar e.pdf
6. Bar eye in Drosophila is an X-linked characteristic in which bar e.pdf
 
8) (Essay) Answer the following questions about Veblen (please provid.pdf
 8) (Essay) Answer the following questions about Veblen (please provid.pdf 8) (Essay) Answer the following questions about Veblen (please provid.pdf
8) (Essay) Answer the following questions about Veblen (please provid.pdf
 
7. Which of the following statements about the U.S. Census is incorre.pdf
 7. Which of the following statements about the U.S. Census is incorre.pdf 7. Which of the following statements about the U.S. Census is incorre.pdf
7. Which of the following statements about the U.S. Census is incorre.pdf
 
A manufacturing company that produces a single product has provided t.pdf
 A manufacturing company that produces a single product has provided t.pdf A manufacturing company that produces a single product has provided t.pdf
A manufacturing company that produces a single product has provided t.pdf
 
A hypothetical population consists of eight individuals ages 13,14,17.pdf
 A hypothetical population consists of eight individuals ages 13,14,17.pdf A hypothetical population consists of eight individuals ages 13,14,17.pdf
A hypothetical population consists of eight individuals ages 13,14,17.pdf
 
A European call option on a non-dividend-paying stock has a market pr.pdf
 A European call option on a non-dividend-paying stock has a market pr.pdf A European call option on a non-dividend-paying stock has a market pr.pdf
A European call option on a non-dividend-paying stock has a market pr.pdf
 
A company based in the United Kingdom has an Italian subsidiary. The .pdf
 A company based in the United Kingdom has an Italian subsidiary. The .pdf A company based in the United Kingdom has an Italian subsidiary. The .pdf
A company based in the United Kingdom has an Italian subsidiary. The .pdf
 
A contractors project being analyzed by PERT has an estimated time f.pdf
 A contractors project being analyzed by PERT has an estimated time f.pdf A contractors project being analyzed by PERT has an estimated time f.pdf
A contractors project being analyzed by PERT has an estimated time f.pdf
 
8. A series of mutant strains (af) of a particular mold are not able .pdf
 8. A series of mutant strains (af) of a particular mold are not able .pdf 8. A series of mutant strains (af) of a particular mold are not able .pdf
8. A series of mutant strains (af) of a particular mold are not able .pdf
 
6. Let X1,X2,�,Xn be iid RVs with mean and finite variance. What is .pdf
 6. Let X1,X2,�,Xn be iid RVs with mean  and finite variance. What is .pdf 6. Let X1,X2,�,Xn be iid RVs with mean  and finite variance. What is .pdf
6. Let X1,X2,�,Xn be iid RVs with mean and finite variance. What is .pdf
 
A basic assumption of activity-based costing (ABC) is that All manufa.pdf
 A basic assumption of activity-based costing (ABC) is that All manufa.pdf A basic assumption of activity-based costing (ABC) is that All manufa.pdf
A basic assumption of activity-based costing (ABC) is that All manufa.pdf
 

Recently uploaded

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 

Recently uploaded (20)

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 

9.4 Computer Fraud and Abuse Techniques. Match the Internet-relat.pdf

  • 1. 9.4 Computer Fraud and Abuse Techniques. Match the Internet-related computer fraud and abuse technique in the left column with the scenario in the right column. The scenarios on the right may be used once, more than once, or not at all. 1. adware a. Software that monitors and reports a user's computing habits 2. botnet b. A program stored in a web page and executed by a web browser 3. bot herder c. Sending an e-mail instructing the recipient to do something or else suffer adverse consequences 4. click fraud d. Using the Internet to pass off the work of another as your own 5. DoS e. E-mailing an unsolicited message to many people at the same time f. Creating websites with names similar to real websites so users making errors while entering a website name are sent to a hacker's site g. An e-mail warning regarding a virus that in reality does not exist h. A spam blog that promotes atfiliated websites to increase their Google PageRank i. Software that collects consumer surfing and purchasing data j. E-mails that look like they came from a legitimate source but are actually from a hacker who is trying to get the user to divulge personal information k. Making an e-mail look like it came from someone else 1. Gaining control of a computer to carry out unauthorized illicit activities m. Using the Internet to disrupt communications and ecommerce n. Diverting traffic from a legitimate website to a hacker's website to gain access to personal and confidential information o. A network of hijacked computers p. Using a legion of compromised computers to launch a coordinated attack on an Internet site q. Use of spyware to record a user's keystrokes r. Hackers that control hijacked computers s. Circulating lies or misleading information using the world's largest network t. Overloading an Internet service provider's e-mail server by sending hundreds of e-mail messages per second from randomly generated false addresses u. Inflating advertising revenue by clicking online ads numerous times