欢迎来到得力文库 - 分享文档赚钱的网站! | 帮助中心 好文档才是您的得力助手!
得力文库 - 分享文档赚钱的网站
全部分类
  • 研究报告>
  • 管理文献>
  • 标准材料>
  • 技术资料>
  • 教育专区>
  • 应用文书>
  • 生活休闲>
  • 考试试题>
  • pptx模板>
  • 工商注册>
  • 期刊短文>
  • 图片设计>
  • ImageVerifierCode 换一换

    Computer Fraud and Abuse Techniques计算机欺诈与滥用技术.pptx

    • 资源ID:776217       资源大小:89.12KB        全文页数:17页
    • 资源格式: PPTX        下载积分:20金币
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录   QQ登录  
    二维码
    微信扫一扫登录
    下载资源需要20金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    Computer Fraud and Abuse Techniques计算机欺诈与滥用技术.pptx

    Computer Fraud and Abuse Techniques,Chapter 6,6-1,Learning Objectives,Compare and contrast computer attack and abuse tactics.Explain how social engineering techniques are used to gain physical or logical access to computer resources.Describe the different types of malware used to harm computers.,6-2,Types of Attacks,HackingUnauthorized access, modification, or use of an electronic device or some element of a computer systemSocial EngineeringTechniques or tricks on people to gain physical or logical access to confidential informationMalwareSoftware used to do harm,6-3,Hacking,HijackingGaining control of a computer to carry out illicit activitiesBotnet (robot network)ZombiesBot herdersDenial of Service (DoS) AttackSpammingSpoofingMakes the communication look as if someone else sent it so as to gain confidential information.,6-4,Forms of Spoofing,E-mail spoofingCaller ID spoofingIP address spoofingAddress Resolution (ARP) spoofingSMS spoofingWeb-page spoofing (phishing)DNS spoofing,6-5,Hacking with Computer Code,Cross-site scripting (XSS)Uses vulnerability of Web application that allows the Web site to get injected with malicious code. When a user visits the Web site, that malicious code is able to collect data from the user.Buffer overflow attackLarge amount of data sent to overflow the input memory (buffer) of a program causing it to crash and replaced with attackers program instructions.SQL injection (insertion) attackMalicious code inserted in place of a query to get to the database information,6-6,Other Types of Hacking,Man in the middle (MITM)Hacker is placed in between a client (user) and a host (server) to read, modify, or steal data.PiggybackingPassword crackingWar dialing and drivingPhreakingData diddlingData leakagepodslurping,6-7,Hacking Used for Embezzlement,Salami technique: Taking small amounts at a timeRound-down fraudEconomic espionageTheft of information, intellectual property and trade secretsCyber-extortionThreats to a person or business online through e-mail or text messages unless money is paid,6-8,Hacking Used for Fraud,Internet misinformationE-mail threatsInternet auction Internet pump and dumpClick fraudWeb crammingSoftware piracy,6-9,Social Engineering Techniques,Identity theftAssuming someone elses identityPretextingUsing a scenario to trick victims to divulge information or to gain accessPosingCreating a fake business to get sensitive informationPhishingSending an e-mail asking the victim to respond to a link that appears legitimate that requests sensitive dataPharmingRedirects Web site to a spoofed Web site,URL hijackingTakes advantage of typographical errors entered in for Web sites and user gets invalid or wrong Web siteScavengingSearching trash for confidential informationShoulder surfingSnooping (either close behind the person) or using technology to snoop and get confidential information SkimmingDouble swiping credit cardEeavesdropping,6-10,Why People Fall Victim,CompassionDesire to help othersGreedWant a good deal or something for freeSex appealMore cooperative with those that are flirtatious or good lookingSlothLazy habits TrustWill cooperate if trust is gainedUrgencyCooperation occurs when there is a sense of immediate needVanityMore cooperation when appeal to vanity,6-11,Minimize the Threat of Social Engineering,Never let people follow you into restricted areasNever log in for someone else on a computerNever give sensitive information over the phone or through e-mailNever share passwords or user IDsBe cautious of someone you dont know who is trying to gain access through you,6-12,Types of Malware,SpywareSecretly monitors and collects informationCan hijack browser, search requestsAdware KeyloggerSoftware that records user keystrokesTrojan HorseMalicious computer instructions in an authorized and properly functioning program,Trap door Set of instructions that allow the user to bypass normal system controlsPacket snifferCaptures data as it travels over the InternetVirusA section of self-replicating code that attaches to a program or file requiring a human to do something so it can replicate itselfWormStand alone self replicating program,6-13,Cellphone Bluetooth Vulnerabilities,BluesnarfingStealing contact lists, data, pictures on bluetooth compatible smartphonesBluebuggingTaking control of a phone to make or listen to calls, send or read text messages,6-14,Key Terms,HackingHijackingBotnetZombieBot herderDenial-of-service (DoS) attackSpammingDictionary attackSplogSpoofingE-mail spoofingCaller ID spoofingIP address spoofingMAC address,Address Resolution Protocol (ARP) spoofingSMS spoofingWeb-page spoofingDNS spoofingZero day attackPatchCross-site scripting (XSS)Buffer overflow attackSQL injection (insertion) attackMan-in-the-middle (MITM) attackMasquerading/impersonationPiggybacking,6-15,Key Terms (continued),Password crackingWar dialingWar drivingWar rocketingPhreakingData diddlingData leakagePodslurpingSalami techniqueRound-down fraudEconomic espionageCyber-extortionCyber-bullyingSexting,Internet terrorismInternet misinformationE-mail threatsInternet auction fraudInternet pump-and-dump fraudClick fraudWeb crammingSoftware piracySocial engineeringIdentity theftPretextingPosingPhishingvishing,6-16,Key Terms (continued),CardingPharmingEvil twinTyposquatting/URL hijackingQR barcode replacementsTabnappingScavenging/dumpster divingShoulder surfingLebanese loopingSkimmingChippingEavesdroppingMalwareSpyware,AdwareTorpedo softwareScarewareRansomwareKeyloggerTrojan horseTime bomb/logic bombTrap door/back doorPacket sniffersSteganography programRootkitSuperzappingVirusWormBluesnarfingBluebugging,6-17,

    注意事项

    本文(Computer Fraud and Abuse Techniques计算机欺诈与滥用技术.pptx)为本站会员(恋****泡)主动上传,得力文库 - 分享文档赚钱的网站仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知得力文库 - 分享文档赚钱的网站(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于得利文库 - 版权申诉 - 用户使用规则 - 积分规则 - 联系我们

    本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知得利文库网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

    工信部备案号:黑ICP备15003705号-8 |  经营许可证:黑B2-20190332号 |   黑公网安备:91230400333293403D

    © 2020-2023 www.deliwenku.com 得利文库. All Rights Reserved 黑龙江转换宝科技有限公司 

    黑龙江省互联网违法和不良信息举报
    举报电话:0468-3380021 邮箱:hgswwxb@163.com  

    收起
    展开