Xem mẫu
Computer Fraud and Abuse Techniques
Chapter 6
Copyright © 2015 Pearson Education, Inc. Copyright © 2015 Pearson Education, Inc.
61
Learning Objectives
• Compare and contrast computer attack and abuse tactics.
• Explain how social engineering techniques are used to gain physical or logical access to computer resources.
• Describe the different types of malware used to harm computers.
Copyright © 2015 Pearson Education, Inc. 62
Types of Attacks
• Hacking
Unauthorized access, modification, or use of an electronic device or some element of a computer system
• Social Engineering
Techniques or tricks on people to gain physical or logical access to confidential information
• Malware
Software used to do harm
Copyright © 2015 Pearson Education, Inc. 63
Hacking
Hijacking
Gaining control of a computer to carry out illicit activities
Botnet (robot network) Zombies
Bot herders
Denial of Service (DoS) Attack Spamming
Spoofing
Makes the communication look as if someone else sent
it so as to gain confidential information.
Copyright © 2015 Pearson Education, Inc. 64
Forms of Spoofing
• Email spoofing
• Caller ID spoofing
• IP address spoofing
• Address Resolution (ARP) spoofing • SMS spoofing
• Webpage spoofing (phishing) • DNS spoofing
Copyright © 2015 Pearson Education, Inc. 65
...
- tailieumienphi.vn
nguon tai.lieu . vn