Exam 6: Computer Fraud and Abuse Techniques
How can a system be protected from viruses?
Install reliable antivirus software that scans for,identifies,and isolates or destroys viruses.Use caution when copying files on to your diskettes from unknown machines.Ensure the latest version of the antivirus program available is used.Scan all incoming e-mails for viruses at the server level.All software should be certified as virus-free before loading it into the system.If you use jump drives,diskettes,or CDs,do not put them in unfamiliar machines as they may become infected.Obtain software and diskettes only from known and trusted sources.Use caution when using or purchasing software or diskettes from unknown sources.Deal with trusted software retailers.Ask whether the software you are purchasing comes with electronic techniques that makes tampering evident.Check new software on an isolated machine with virus detection software before installing on the system.Cold boot to clear and reset the system.When necessary,"cold boot" the machine from a write-protected diskette.Have two backups of all files.Restrict the use of public bulletin boards.
Describe ways to help minimize social engineering.
Never let people follow you into a restricted building.Never log in for someone else on a computer,especially if you have administrative access.Never give sensitive information over the phone or through e-mail.Never share passwords or user IDs.Be cautious of anyone you do not know who is trying to gain access through you.
Illegally obtaining and using confidential information about a person for economic gain is known as
A fraud technique that allows a hacker to place himself or herself between a client and a host to intercept network traffic is called the ________ technique.
Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by
It was late on a Friday afternoon when Chloe Pike got a call at the help desk for Taggart Corp.A man with an edge of panic in his voice was on the phone."I'm really in a bind and I sure hope that you can help me." He identified himself as Joe Andrew from the accounting department of Taggart Corp.He told Chloe that he had to work on a report that was due on Monday morning and that he had forgotten to bring a written copy of his new password home with him.Chloe knew that Taggart's new password policy required that passwords be at least fifteen characters long,must contain letters and numbers,and must be changed every sixty days,had created problems for many users.Consequently,Chloe provided the password to Joe.The caller turned out not to be Joe Andrew,and Chloe was a victim of
Individuals who control an army of malware-infected zombie computers are referred to as
Inspecting information packets as they travel across computer networks are referred to as
Describe at least four social engineering techniques.Provide an example for one of the techniques.
Megan has purchased a brand new laptop about three months ago.Recently,she feels that her computer is operating much more slowly and sluggishly than before.Since purchasing the computer,Megan had been accessing the Internet and had installed a variety of free software.The problem is mostly likely to be
Mircea Vasilescu maintains an online brokerage account.In early March,Mircea received an e-mail from the firm that explained that there had been a computer error and asked Mircea to call a phone number to verify his customer information.When Mircea called the number,a recording asked that he enter the code from the e-mail,his account number,and his social security number.After he did so,he was told that he would be connected with a customer service representative,but the connection was terminated.He contacted the brokerage company and was informed that they had not sent the e-mail.Mircea was a victim of
Unauthorized access,modification,or use of an electronic device or some element of a computer system is known as
Taking control of a phone to make calls,send text messages,listen to calls,or read text messages is called
After graduating from college,Rob Johnson experienced some difficulty in finding full-time employment.Trying to make ends meet,Rob used all of his saving to buy a significant number of shares in small,low-priced,thinly traded penny stocks.He then uses spam e-mails and blog postings to disseminate overly optimistic information about the company in hope to drives up the company's stock price.He is waiting to sell his shares to investors and pocket a profit.He is engaged in
Redirecting traffic to a spoofed website to obtain confidential information is known as
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)