Chapter 9: Computer Fraud and Abuse Techniques

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

Social engineering

use psychological tricks to get victims to comply with the attacker’s wishes (often to gain access to a system or confidential data).

  • Often take advantage of our compassion, greed, sex appeal, sloth, trust, urgency, and vanity.

2
New cards

Techniques used in social engineering

Phishing, Pretexting, Posing, pharming, Typosquatting, shoulder surfing, etc.

3
New cards

Typosquatting

Cybercriminals registers domain names that are misspellings of legitimate websites.

4
New cards

Pharming

redirects website traffic to a spoofed website, even if the correct URL is entered.

5
New cards

How was the Brazilian banking pharming attack conducted?

Criminals changed the Domain Name System (DNS) settings on bank customers’ home Wi-Fi routers.

6
New cards

Spoofing:

faking the identity to gain the trust of the victims.

7
New cards

Types of Spoofing?

Web-page spoofing

IP address spoofing: to impersonate another computer (likely to bypass authentication based on IP addresses)

Caller ID spoofing

E-mail spoofing (with forged sender address)

8
New cards

Malware

Any malicious software that is used to do harm. Watch a video that helps you remember some terms below

9
New cards

Ransomware

Locks you out of programs and encrypt your data so that a ransom payment can be demanded.

10
New cards

Spyware

Secretly monitors and collects information and sends it to cybercriminals

11
New cards

Adware

pops up ads and can collect info about web-surfing habits

12
New cards

Keylogger

records users’ keystrokes to steal sensitive data.

13
New cards

Virus

A segment of code that attaches to a program/file that is self-replicating (but needs user to run infected file);

14
New cards

Worm

A program that stands alone, and is automatically self-replicating (without user action);

15
New cards

Trojan Horse

Malicious code inserted in an authorized & functioning program; does not replicate itself.

16
New cards

Time/Logic bomb

lies idle until a specified time or event occurs.

17
New cards

Keylogger Trojan

Trojan horse with keylogger bundled inside.

18
New cards

Zero-day attack (or zero-hour attack)

An attack between the time a new software vulnerability is discovered and the time the developer releases a patch fixing the problem.

Companies (e.g., Google, Microsoft, Tesla) launch bug bounty programs, paying ethical hackers to find bugs before criminals do.

19
New cards

Man in the middle (MITM)

Attackers place their devices in between a legitimate user and a host (server) or between two legitimate users, impersonate both parties, to intercept or modify their communication.

Common on unsecured public Wi-Fi or via Evil Twin attacks.

20
New cards

Botnet

network of hijacked computers or IoT devices (bots or zombies) that are used by the bot herder (or botmaster) to attack systems or spread malware. Estimated1-5% online devices worldwide are part of botnet.

21
New cards

(Distributed) Denial-of-Service (DoS or DDoS) attack:

often using Botnets to overload and shut down servers and prevent legitimate users from accessing them:

  • E-mail DoS attack: send many emails from false addresses

  • Web page DoS attack: send many web page requests

22
New cards

Vulnerabilities with Bluetooth Devices

When turning on Bluetooth, you are broadcasting the device’s MAC address to people nearby.

Attackers could:

Access contact lists, data, pictures, and private info (Bluesnarfing);

Take control of your device and send text messages or make calls and payments (Bluebugging).

23
New cards

Preventive measures for bluetooth devices?

Turn off Bluetooth when not in use;

Avoid pairing in public;

Install security patches and antivirus software on devices.