1. Trang chủ
  2. » Giáo án - Bài giảng

Accounting information system an overview 9e bodnar and hopwood 2015 chapter 06

17 115 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 17
Dung lượng 89,12 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

• Explain how social engineering techniques are used to gain physical or logical access to computer resources.. Types of Attacks• Hacking ▫ Unauthorized access, modification, or use of

Trang 1

Computer Fraud and Abuse Techniques

Chapter 6

Trang 2

Learning Objectives

• Compare and contrast computer attack and abuse tactics.

• Explain how social engineering techniques are used to gain physical or logical access

to computer resources.

• Describe the different types of malware used to harm computers.

Trang 3

Types of Attacks

• Hacking

▫ Unauthorized access, modification, or use of an electronic device or some element of a computer system

• Social Engineering

▫ Techniques or tricks on people to gain physical or logical access to confidential

information

• Malware

▫ Software used to do harm

Trang 4

▫ Hijacking

 Gaining control of a computer to carry out illicit activities

▫ Botnet (robot network)

 Bot herders

 Denial of Service (DoS) Attack

 Spoofing

Trang 5

Forms of Spoofing

• E-mail spoofing

• Caller ID spoofing

• IP address spoofing

• Address Resolution (ARP) spoofing

• SMS spoofing

• Web-page spoofing (phishing)

• DNS spoofing

Trang 6

Hacking with Computer Code

• Cross-site scripting (XSS)

▫ Uses vulnerability of Web application that allows the Web site to get injected with malicious code When a user visits the Web site, that malicious code is able to collect data from the user

• Buffer overflow attack

▫ Large amount of data sent to overflow the input memory (buffer) of a program causing

it to crash and replaced with attacker’s program instructions

• SQL injection (insertion) attack

▫ Malicious code inserted in place of a query to get to the database information

Trang 7

Other Types of Hacking

• Man in the middle (MITM)

▫ Hacker is placed in between a client (user) and a host (server) to read, modify, or steal data

• Piggybacking

• Password cracking

• War dialing and driving

• Phreaking

• Data diddling

• Data leakage

• podslurping

Trang 8

Hacking Used for Embezzlement

• Salami technique:

▫ Taking small amounts at a time

 Round-down fraud

• Economic espionage

▫ Theft of information, intellectual property and trade secrets

• Cyber-extortion

▫ Threats to a person or business online through e-mail or text messages unless money

is paid

Trang 9

Hacking Used for Fraud

• Internet misinformation

• E-mail threats

• Internet auction

• Internet pump and dump

• Click fraud

• Web cramming

• Software piracy

Trang 10

Social Engineering Techniques

• Identity theft

▫ Assuming someone else’s identity

• Pretexting

▫ Using a scenario to trick victims to divulge

information or to gain access

• Posing

▫ Creating a fake business to get sensitive

information

• Phishing

▫ Sending an e-mail asking the victim to respond to a

link that appears legitimate that requests sensitive data

• Pharming

▫ Redirects Web site to a spoofed Web site

• URL hijacking

▫ Takes advantage of typographical errors entered in for Web sites and user gets invalid or wrong Web site

• Scavenging

▫ Searching trash for confidential information

• Shoulder surfing

▫ Snooping (either close behind the person) or using technology to snoop and get confidential

information

• Skimming

 Double swiping credit card

• Eeavesdropping

Trang 11

Why People Fall Victim

• Compassion

▫ Desire to help others

• Greed

▫ Want a good deal or something for free

• Sex appeal

▫ More cooperative with those that are flirtatious or good looking

• Sloth

▫ Lazy habits

• Trust

▫ Will cooperate if trust is gained

• Urgency

▫ Cooperation occurs when there is a sense of immediate need

• Vanity

▫ More cooperation when appeal to vanity

Trang 12

Minimize the Threat of Social Engineering

• Never let people follow you into restricted areas

• Never log in for someone else on a computer

• Never give sensitive information over the phone or through e-mail

• Never share passwords or user IDs

• Be cautious of someone you don’t know who is trying to gain access through you

Trang 13

Types of Malware

• Spyware

▫ Secretly monitors and collects information

▫ Can hijack browser, search requests

▫ Adware

• Keylogger

▫ Software that records user keystrokes

• Trojan Horse

▫ Malicious computer instructions in an authorized

and properly functioning program

• Trap door

▫ Set of instructions that allow the user to bypass normal system controls

• Packet sniffer

▫ Captures data as it travels over the Internet

• Virus

▫ A section of self-replicating code that attaches to a program or file requiring a human to do something

so it can replicate itself

• Worm

▫ Stand alone self replicating program

Trang 14

Cellphone Bluetooth Vulnerabilities

• Bluesnarfing

▫ Stealing contact lists, data, pictures on bluetooth compatible smartphones

• Bluebugging

▫ Taking control of a phone to make or listen to calls, send or read text messages

Trang 15

Key Terms

• Hacking

• Hijacking

• Botnet

• Zombie

• Bot herder

• Denial-of-service (DoS) attack

• Spamming

• Dictionary attack

• Splog

• Spoofing

• E-mail spoofing

• Caller ID spoofing

• IP address spoofing

• Address Resolution Protocol (ARP) spoofing

• SMS spoofing

• Web-page spoofing

• DNS spoofing

• Zero day attack

• Patch

• Cross-site scripting (XSS)

• Buffer overflow attack

• SQL injection (insertion) attack

• Man-in-the-middle (MITM) attack

• Masquerading/impersonation

• Piggybacking

Trang 16

Key Terms (continued)

• Password cracking

• War dialing

• War driving

• War rocketing

• Phreaking

• Data diddling

• Data leakage

• Podslurping

• Salami technique

• Round-down fraud

• Economic espionage

• Internet terrorism

• Internet misinformation

• E-mail threats

• Internet auction fraud

• Internet pump-and-dump fraud

• Click fraud

• Web cramming

• Software piracy

• Social engineering

• Identity theft

• Pretexting

• Posing

• Phishing

Trang 17

Key Terms (continued)

• Carding

• Pharming

• Evil twin

• Typosquatting/URL hijacking

• QR barcode replacements

• Tabnapping

• Scavenging/dumpster diving

• Shoulder surfing

• Lebanese looping

• Skimming

• Chipping

• Eavesdropping

• Malware

• Spyware

• Adware

• Torpedo software

• Scareware

• Ransomware

• Keylogger

• Trojan horse

• Time bomb/logic bomb

• Trap door/back door

• Packet sniffers

• Steganography program

• Rootkit

• Superzapping

• Virus

• Worm

• Bluesnarfing

• Bluebugging

Ngày đăng: 12/05/2017, 10:53

TỪ KHÓA LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm