Professional Documents
Culture Documents
Rais12 PPT 06
Rais12 PPT 06
Hacking
Unauthorized access, modification, or use of a computer system or other
electronic device
Social Engineering
Techniques, usually psychological tricks, to gain access to sensitive data
or information
Used to gain access to secure systems or locations
Malware
Any software which can be used to do harm
Spoofing
Making an electronic communication look as if it comes from a trusted
official source to lure the recipient into providing information
Buffer Overflow
Data is sent that exceeds computer capacity causing program instructions
to be lost and replaced with attacker instructions.
Man-in-the-Middle
Hacker places themselves between client and host.
War Dialing
Computer automatically dials phone numbers looking for modems.
Phreaking
Attacks on phone systems to obtain free phone service.
Data Diddling
Making changes to data before, during, or after it is entered into a system.
Data Leakage
Unauthorized copying of company data.
Economic Espionage
Theft of information, trade secrets, and intellectual property.
Cyber-Bullying
Internet, cell phones, or other communication technologies to support
deliberate, repeated, and hostile behavior that torments, threatens, harasses,
humiliates, embarrasses, or otherwise harms another person.
Internet Terrorism
Act of disrupting electronic commerce and harming computers and
communications.
Internet Misinformation
Internet Misinformation
Using the Internet to spread false or misleading information
Internet Auction
Using an Internet auction site to defraud another person
Unfairly drive up bidding
Seller delivers inferior merchandise or fails to deliver at all
Buyer fails to make payment
Internet Pump-and-Dump
Using the Internet to pump up the price of a stock and then selling it
Pharming
Redirecting Web site traffic to a spoofed
Web site.
Lebanese Loping
Capturing ATM pin and card numbers
Skimming
Double-swiping a credit card
Chipping
Planting a device to read credit card information in a credit card reader
Eavesdropping
Listening to private communications
Key logging
Records computer activity, such as a user’s keystrokes, e-mails sent and received, Web
sites visited, and chat session participation
Trojan Horse
Malicious computer instructions in an authorized and otherwise properly functioning
program
Time bombs/logic bombs
Idle until triggered by a specified date or time, by a change in the system, by a
message sent to the system, or by an event that does not occur
Packet Sniffers
Capture data from information packets as they travel over networks
Rootkit
Used to hide the presence of trap doors, sniffers, and key loggers; conceal
software that originates a denial-of-service or an e-mail spam attack; and
access user names and log-in information
Superzapping
Unauthorized use of special system programs to bypass regular system
controls and perform illegal acts, all without leaving an audit trail