ACCT2000 Chapter Notes - Chapter 6: Caller Id Spoofing, Short Message Service, Ip Address Spoofing

19 views6 pages

Document Summary

Week five - computer fraud and abuse techniques. Hacking is the unauthorised access, modification or use of an electronic device or some element of a computer system. Hija(cid:272)ki(cid:374)g is gai(cid:374)i(cid:374)g (cid:272)o(cid:374)trol of so(cid:373)eo(cid:374)e else"s (cid:272)o(cid:373)puter to (cid:272)arr(cid:455) out illi(cid:272)it a(cid:272)ti(cid:448)ities, such as sending spa(cid:373) (cid:449)ithout the (cid:272)o(cid:373)puter user"s k(cid:374)o(cid:449)ledge. Botnet is a network of powerful and dangerous hijacked computers that are used to attack systems and spread malware. A zombie is a hijacked computer, typically part of a botnet, that is used to launch a variety of internet attacks. A bot herder is the person who creates a botnet by installing software on pcs that responds to the (cid:374)ot herder"s ele(cid:272)tro(cid:374)i(cid:272) i(cid:374)stru(cid:272)tio(cid:374)s. Spamming is simultaneously sending the same unsolicited message to many people, often in an attempt to sell them something. A dictionary attack is using special software to guess the company email addresses and send them blank email messages.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents