9.4 Computer Fraud and Abuse Techniques. Match the Internet-related computer fraud and abuse technique in the left column with the scenario in the right column. The scenarios on the right may be used once, more than once, or not at all. 1. adware a. Software that monitors and reports a user's computing habits 2. botnet b. A program stored in a web page and executed by a web browser 3. bot herder c. Sending an e-mail instructing the recipient to do something or else suffer adverse consequences 4. click fraud d. Using the Internet to pass off the work of another as your own 5. DoS e. E-mailing an unsolicited message to many people at the same time f. Creating websites with names similar to real websites so users making errors while entering a website name are sent to a hacker's site g. An e-mail warning regarding a virus that in reality does not exist h. A spam blog that promotes atfiliated websites to increase their Google PageRank i. Software that collects consumer surfing and purchasing data j. E-mails that look like they came from a legitimate source but are actually from a hacker who is trying to get the user to divulge personal information k. Making an e-mail look like it came from someone else 1. Gaining control of a computer to carry out unauthorized illicit activities m. Using the Internet to disrupt communications and ecommerce n. Diverting traffic from a legitimate website to a hacker's website to gain access to personal and confidential information o. A network of hijacked computers p. Using a legion of compromised computers to launch a coordinated attack on an Internet site q. Use of spyware to record a user's keystrokes r. Hackers that control hijacked computers s. Circulating lies or misleading information using the world's largest network t. Overloading an Internet service provider's e-mail server by sending hundreds of e-mail messages per second from randomly generated false addresses u. Inflating advertising revenue by clicking online ads numerous times.