Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword
Like this
0Activity
×
0 of .
Results for:
No results containing your search query
P. 1
Chapter 6

Chapter 6

Ratings: (0)|Views: 57|Likes:
Published by Ivan Bliminse

More info:

Published by: Ivan Bliminse on Nov 16, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, PPT, TXT or read online from Scribd
See More
See less

11/16/2012

pdf

text

original

 
Chapter 6
Computer Fraud and AbuseTechniques
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall
6-1
 
Learning Objectives
Compare and contrast computer attack and abuse tactics.
Explain how social engineeringtechniques are used to gain physical or logical access to computer resources.
Describe the different types of malwareused to harm computers.
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall
6-2
 
Computer Attacks and Abuse
Hacking
Unauthorized access, modification, or use of acomputer system or other electronic device
Social Engineering
Techniques, usually psychological tricks, to gainaccess to sensitive data or information
Used to gain access to secure systems or locations
Malware
Any software which can be used to do harm
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall
6-3

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->