130 likes | 152 Views
Explore different computer attacks and abuse techniques, including hacking, social engineering, malware, and various types of hacking attacks. Learn about spoofing, hacking embezzlement schemes, social engineering techniques, and types of malware used for harmful purposes.
E N D
HAPTER 6 Computer Fraud and Abuse Techniques
INTRODUCTION • Questions to be addressed in this chapter: • Compare and contrast computer attack and abuse tactics. • Explain how social engineering techniques are used to gain physical or logical access to computer resources. • Describe the different types of malware used to harm computers.
Computer Attacks and Abuse • Hacking • Unauthorized access, modification, or use of a computer system or other electronic device • Social Engineering • Techniques, usually psychological tricks, to gain access to sensitive data or information • Used to gain access to secure systems or locations • Malware • Any software which can be used to do harm
Types of HackingAttacks • Botnet—Robot Network • Zombie • Denial-of-Service (DoS) Attack • Spamming • Dictionary Attacks • Spoofing
Types of Spoofing • E-mail • Caller-ID • IP address • Address Resolution Protocol (ARP) • SMS • Web page • DNS
Hacking Attacks • Zero-Day Attack • Cross-Site Scripting (XSS) • Buffer Overflow • SQL Injection (Insertion) • Man-in-the-Middle • Masquerading/Impersonation
Additional Hacking Attacks • Piggybacking • Password Cracking • War Dialing • Phreaking • Data Diddling • Data Leakage • Podslurping
Hacking Embezzlement Schemes • Salami Technique • Round down • Economic Espionage • Cyber-Extortion • Cyber-Bullying • Sexting • Internet Terrorism • Internet Misinformation
Hacking for Fraud • E-mail Threats • Internet Auction Fraud • Internet Pump-and-Dump • Click Fraud • Web Cramming • Software Piracy
Social Engineering Techniques • Identity Theft • Pretexting • Posing • Phishing • Pharming • Typosquatting • Tabnapping • Scavenging • Shoulder Surfing
More Social Engineering • Lebanese Loping • Skimming • Chipping • Eavesdropping
Type of Malware • Spyware • Adware • Scareware • Ransomware • Key logging • Trojan Horse • Time Bomb/Logic Bomb • Trap Door/Back Door • Packet Sniffers • Steganography • Rootkit
More Malware • Superzapping • Virus • Worm • Bluebugging • Bluesnarfing