AIS Chapter 9 Final Exam Review - Fraud Terms

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

Botnet

a powerful network of hijacked computers (zombies) that are used to attack systems or spread malware

2
New cards

Denial-of-service attack

An attack designed to make computer resources unavailable to its users. For example, sending so many e-mail messages that the Internet service provider's e-mail server is overloaded and shuts down.

3
New cards

Spoofing

Altering some part of an electronic communication to make it look as if someone else sent the communication to gain the trust of the recipient. EX: such as email addresses, caller IDs, IP addresses, address resolution protocols, SMS messages, web pages, and domain name systems.

4
New cards

XSS Attack

(Cross - site scripting) A vulnerability in dynamic web pages that allows an attacker to bypass a browser's security mechanisms and instruct the victim's browser to execute code, thinking it came from the desired website. (Malicious code embedded in a Web link.)

5
New cards

Buffer Overflow Attack

Inputting so much data that the input buffer overflows, the overflow contains code that takes control of the computer

6
New cards

Man-in-the-Middle Attack

A hacker placing himself between a client and a host to intercept network traffic

7
New cards

SQL Insertion (injection)

Inserting a malicious SQL query such that it is passed to and executed by an application program

8
New cards

Piggybacking

1. Secret use of someone's Wi-Fi network.

2. Tapping into a communications line and entering a system by latching onto a legitimate user.

3. Bypassing physical security controls by entering a secure door when an authorized person opens it.

9
New cards

Round-Down-Fraud

Truncating interest calculations at two decimal places and placing truncated amounts in the perpetrator's accounts

10
New cards

Pod Slurping

Using a small device with storage capacity to download unauthorized data from a computer

11
New cards

Salami Technique

Stealing tiny slices of money over time.

12
New cards

Social Engineering

Techniques that trick a person into disclosing confidential information.

13
New cards

Pretexting (emotion)

Acting under false pretenses to gain confidential information.

14
New cards

Phishing (ONLY EMAIL)

Communications that request recipients to disclose confidential information by responding to an e-mail or visiting a website.

15
New cards

Posing

Creating a seemingly legitimate business, collecting personal data while making a sale, and never delivering the items sold.

16
New cards

Evil Twin

A wireless network with the same name as another wireless access point. Users unknowingly connect to the evil twin; hackers monitor the traffic looking for useful information.

17
New cards

Typo squatting

Websites with names similar to real websites; users making typographical errors are sent to a site filled with malware.

18
New cards

Shoulder surfing

When perpetrators look over a person's shoulders in a public place to get information such as ATM PIN numbers or user IDs and passwords.

19
New cards

Chipping

Planting a chip that records transaction data in a legitimate credit card reader.

20
New cards

Lebanese looping

Inserting a sleeve into an ATM that prevents it from ejecting the card. The perpetrator pretends to help the victim, tricking the person into entering the PIN again. Once the victim gives up and leaves, the thief removes the card and uses it and the PIN to withdraw money.

21
New cards

Skimming

Double-swiping a credit card in a legitimate terminal or covertly swiping a credit card in a small, hidden, handheld card reader that records credit card data for later use.

22
New cards

Adware

Spyware that collects and forwards data to advertising companies or causes banner ads to pop up as the Internet is surfed.

23
New cards

Keylogger

Using spyware to record a user's keystrokes.

24
New cards

Ransomeware

Software that encrypts programs and data until a ransom is paid to remove it.

25
New cards

Trojan Horse

Unauthorized code in an authorized and properly functioning program.

26
New cards

Packet Sniffers

Inspecting information packets as they travel across computer networks.

27
New cards

rootkit

A means of concealing system components and malware from the operating system and other programs; can also modify the operating system.

28
New cards

Steganography

Concealing data within a large MP3 or other file (often image files).

29
New cards

Virus

Executable code that attaches itself to software, replicates itself, and spreads to other systems or files. When triggered, it makes unauthorized alterations to the way a system operates.

30
New cards

Worm

Similar to a virus; a program rather than a code segment hidden in a host program. Actively transmits itself to other systems. It usually does not live long but is quite destructive while alive.

31
New cards

Bluesnarfing

Stealing (snarfing) contact lists, images, and other data using flaws in Bluetooth applications.

Explore top flashcards