Term
|
Definition
the intent to destroy or harm a system or some of its components |
|
|
Term
|
Definition
typically business people who commit fraud |
|
|
Term
missappropriation of assets or employee fraud |
|
Definition
|
|
Term
fraudulent financial reporting |
|
Definition
intentional or reckless conduct that results in materially misleading financial statements |
|
|
Term
|
Definition
Opportunity, Rationalization, Pressure
opportunity - commit, convert, conceal |
|
|
Term
|
Definition
a person's incentive or motivation for committing fraud |
|
|
Term
|
Definition
any illegal act for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution |
|
|
Term
|
Definition
clicking on ads numerous times to inflate advertising bills |
|
|
Term
|
Definition
sending email bombs from randomly generated false addresses, the recipient's internet service provider email server is overloaded and shuts down |
|
|
Term
|
Definition
wireless network with the same name as a local wireless access point |
|
|
Term
|
Definition
accessing and using computer systems without permission, usually by means of a personal computer and telecommunications network |
|
|
Term
|
Definition
gaining control of someone else's computer to carry out illicit activities without the owner's knowledge |
|
|
Term
|
Definition
assuming someone's identity, usually for economic gain, by illegally obtaining confidential information |
|
|
Term
|
Definition
using spyware to record a user's keystrokes |
|
|
Term
|
Definition
software that can be used to do harm |
|
|
Term
|
Definition
using a computer to find confidential information as it travels the internet and other networks |
|
|
Term
|
Definition
penetrating system defenses, stealing passwords and decrypting them so they can be used to access system programs, files, and data |
|
|
Term
|
Definition
redirecting traffic to a spoofed web site to gain access to personal and confidential information |
|
|
Term
|
Definition
sending emails requesting recipients to visit a web page to verify or fill in missing data. |
|
|
Term
|
Definition
1. using someone's wi-fi network for mischief, hacking, etc, 2. tapping into a telecommunications line , latching onto an authorized user and accompanying them into the system 3. bypassing physical security by entering when an authorized person enters |
|
|
Term
|
Definition
pretending to be a legitimate business, collecting money and info and never delivering a product |
|
|
Term
scavenging/dumpster diving |
|
Definition
looking for personal information in the trash or on old hard drives |
|
|
Term
|
Definition
listening to someone as they give out confidential information to another |
|
|
Term
|
Definition
double-swiping credit cards or swiping a card into a card reader to record the data for later use |
|
|
Term
|
Definition
emailing an unsolicited message to many people at the same time |
|
|
Term
|
Definition
using software to monitor computing habits and send the data to someone else without the computer user's permission |
|
|
Term
|
Definition
entering a system using a back door that bypasses normal system controls |
|
|
Term
|
Definition
unauthorized code or virus hiding inside and authorized program |
|
|
Term
|
Definition
a segment of code that attaches itself to software, replicates and spreads to other systems or files |
|
|
Term
|
Definition
voice phishing where email recipients are asked to call a phone number where they then divulge personal information |
|
|
Term
|
Definition
dialing thousands of phone lines searching for idle modems that can be used to enter a system |
|
|
Term
|
Definition
looking for unprotected wireless networks using a car or rocket |
|
|
Term
|
Definition
program hidden in a host program, copies and actively transmits itself to other systems |
|
|
Term
|
Definition
an attack between the time a new software vulnerability is discovered and a software patch that fixes the problem is released |
|
|