Chapter IV. Computer Fraud and Abuse Techniques Learning Objective
Chapter IV. Computer Fraud and Abuse Techniques Learning Objective
Learning Objective
• Explain how social engineering techniques are used to gain physical or logical access to
computer resources.
A. Types of Attack
1. Hacking
o Unauthorized access, modification, or use of an electronic device or
some element of a computer system
Zombies
Bot herders
Spamming
Spoofing
Form of Spoofing
• E-mail spoofing
• Caller ID spoofing
• IP address spoofing
• SMS spoofing
• DNS spoofing
Hacking with Computer Code
• Piggybacking
• Password cracking
• Phreaking
• Data diddling
• Data leakage
• podslurping
• Salami technique:
Round-down fraud
• Economic espionage
• Internet misinformation
• E-mail threats
• Internet auction
• Click fraud
• Web cramming
• Software piracy
2. Social Engineering
o Techniques or tricks on people to gain physical or logical access to
confidential information
Identity theft
Pretexting
Posing
Phishing
Pharming
URL hijacking
Shoulder surfing
Skimming
Eeavesdropping
• Compassion
• Greed
• Sex appeal
• Sloth
▫ Lazy habits
• Trust
• Urgency
• Vanity
3. Malware
o Software used to do harm
Types of Malware
• Spyware
▫ Secretly monitors and collects information
▫ Can hijack browser, search requests
▫ Adware
• Keylogger
▫ Software that records user keystrokes
• Trojan Horse
▫ Malicious computer instructions in an authorized and properly
functioning program
• Trap door
▫ Set of instructions that allow the user to bypass normal system
controls
• Packet sniffer
▫ Captures data as it travels over the Internet
• Virus
▫ A section of self-replicating code that attaches to a program or
file requiring a human to do something so it can replicate itself
• Worm
▫ Stand alone self replicating program
• Bluesnarfing
▫ Stealing contact lists, data, pictures on bluetooth compatible
smartphones
• Bluebugging
▫ Taking control of a phone to make or listen to calls, send or read
text messages
Assignment
This assignment is for group. I ask you to make an illustration video about the process of hacking,
scamming, social enggineering fraud and also malware. Please, choose one of the fraud technique.
I give you want week to finish it!