Home / Expert Answers / Computer Science / 9-7-computer-fraud-and-abuse-techniques-match-the-computer-fraud-and-abuse-technique-in-the-left-c-pa841

(Solved): 9.7 Computer Fraud and Abuse Techniques. Match the computer fraud and abuse technique in the left c ...




9.7 Computer Fraud and Abuse Techniques.
Match the computer fraud and abuse technique in the left column with the scenario in
f. Covertly swiping a credit card in a card reader that records the data for later use
7. e-mail spoofing
g. Using the Inteme
11. Lebanese looping
k. Making an electronic communication appear as though it originated from a different source
12. man-in-

r. Displaying an incorrect phone number to hide the callers identity
s. Software that encrypts programs and data until a pay

x. Verifying credit card validity
y. Secretly changing an already open browser tab
9.7 Computer Fraud and Abuse Techniques. Match the computer fraud and abuse technique in the left column with the scenario in the right column. The scenarios on the right may be used once, more than once, or not at all. 1. buffer overflow attack a. Inserting a sleeve to trap a card in an ATM, pretending to help the owner to obtain his PIN, and using the card and PIN to drain the account 2. carding b. Segment of executable code that attaches itself to software 3. caller ID spoofing c. Using a small storage device to download unauthorized data from a computer 4. cyber-extortion d. Malicious computer code that specifically targets a computer's start-up instructions 5. cyber-bullying e. Malicious software that people are frightened into buying f. Covertly swiping a credit card in a card reader that records the data for later use 7. e-mail spoofing g. Using the Intemet to inflate a stock price so it can be sold for a profit 8. IP address spoofing h. Exchanging explicit messages and pictures by telephone 9. Internet auction fraud i. Inserting a malicious database query in input in a way that it can be executed by an application program 10. Internet pump and-dump fraud j. So much input data that storage is exceeded; excess input 11. Lebanese looping k. Making an electronic communication appear as though it originated from a different source 12. man-in-the-middle (MITM) attack I. Creating packets with a forged address to impersonate another computing system 13. podslurping . Fake computer networking protocol messages sent to an Ethernet LAN to determine a network host's hardware address when only its IP address is known 14. ransomware n. Changing the name or number a text message appears to come from 15. scareware o. Special code or password that bypasses security features 16. sexting p. Link containing malicious code that takes a victim to a vulnerable website where the victim's browser executes the malicious code embedded in the link 17. SQL injection q. Using social networking to harass another person r. Displaying an incorrect phone number to hide the caller's identity s. Software that encrypts programs and data until a payment is made to remove it t. A hacker placing himselt between a client and a host to intercept network traffic u. Demand for payment to ensure a hacker does not harm a computer v. Theft of trade secrets and intellectual property w. Using a site that sells to the highest bidder to defraud another person x. Verifying credit card validity y. Secretly changing an already open browser tab


We have an Answer from Expert

View Expert Answer

Expert Answer


buffer overflow attack - j. So much input data that storage is exceeded; excess input.carding - f. Covertly swiping a credit card in a card reader tha
We have an Answer from Expert

Buy This Answer $5

Place Order

We Provide Services Across The Globe