9.6 Computer Fraud and Abuse Techniques. Match the computer fraud and abuse technique in
the left column witht the scenario in the right column. The scenarios on the right may be used
once, more than once, or not at all. 1. dictionary attack a. Guessing user IDs and passwords using
a dictionary of user IDs and passwords 2. hacking b. Segment of executable code that attaches
itself to software 3. logic bomb c. Recovering passwords by trying every possible combination of
characters and comparing them to a cryptographic hash of the password 4. malware d. Malicious
computer code that specifically targets a computer's start-up instructions 5. masquerading e.
Using a wireless network without permission
6. password cracking f. Covertly swiping a credit card in a card reader that records the data for
later use 7. piggybacking g. Concealing data within a large MP3 file 8. posing h. Attack
occurring between the discovery of a software vulnerability and the release of a patch to fix the
problem 9. protexting
I. Entering a system using a back door that bypasses normal system controls 10. rootkit j. Using
software to guess company addresses, send employees blank e-mails, and add unreturned
messages to spammer e-mail lists 11. shoulder surfing k. Unauthorized code in an authorized and
properly functioning program 12. skimming 1. Software used to do harm 13. social engineering
m. Program that can replicate itself and travel over networks 14. software piracy n. Pretending to
be a legitimate user, thereby gaining access to a system and all the rights and privileges of the
legitimate user
15. steganography o. Special code or password that bypasses security features 16. trap door p.
Unauthorized copying or distribution of copyrighted software 17. Trojan horse q. Software that
conceals processes, files, network connections, and system data from the operating system and
other programs 18. virus r. Methods used to trick someone into divulging personal information
19. worm s. Software that sits idle until a specified circumstance or time triggers it 20. zero-day
attack t. Duplicating software, music, or movies u. Acting under false pretenses to gain
confidential information
v. Observing or listening to users as they divulge personal information w. Gaining access to a
computer system without permission x. Creating a seemingly legitimate business, collecting
personal information while making a sale, and never delivering the item sold

9.6 Computer Fraud and Abuse Techniques. Match the computer f.pdf

  • 1.
    9.6 Computer Fraudand Abuse Techniques. Match the computer fraud and abuse technique in the left column witht the scenario in the right column. The scenarios on the right may be used once, more than once, or not at all. 1. dictionary attack a. Guessing user IDs and passwords using a dictionary of user IDs and passwords 2. hacking b. Segment of executable code that attaches itself to software 3. logic bomb c. Recovering passwords by trying every possible combination of characters and comparing them to a cryptographic hash of the password 4. malware d. Malicious computer code that specifically targets a computer's start-up instructions 5. masquerading e. Using a wireless network without permission 6. password cracking f. Covertly swiping a credit card in a card reader that records the data for later use 7. piggybacking g. Concealing data within a large MP3 file 8. posing h. Attack occurring between the discovery of a software vulnerability and the release of a patch to fix the problem 9. protexting I. Entering a system using a back door that bypasses normal system controls 10. rootkit j. Using software to guess company addresses, send employees blank e-mails, and add unreturned messages to spammer e-mail lists 11. shoulder surfing k. Unauthorized code in an authorized and properly functioning program 12. skimming 1. Software used to do harm 13. social engineering m. Program that can replicate itself and travel over networks 14. software piracy n. Pretending to be a legitimate user, thereby gaining access to a system and all the rights and privileges of the legitimate user 15. steganography o. Special code or password that bypasses security features 16. trap door p. Unauthorized copying or distribution of copyrighted software 17. Trojan horse q. Software that conceals processes, files, network connections, and system data from the operating system and other programs 18. virus r. Methods used to trick someone into divulging personal information 19. worm s. Software that sits idle until a specified circumstance or time triggers it 20. zero-day attack t. Duplicating software, music, or movies u. Acting under false pretenses to gain confidential information v. Observing or listening to users as they divulge personal information w. Gaining access to a computer system without permission x. Creating a seemingly legitimate business, collecting
  • 2.
    personal information whilemaking a sale, and never delivering the item sold