Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Identify the computer fraud and abuse technique - A. B. C. D. E. F. G. A federal grand jury in Fort Lauderdale claimed that four

Identify the computer fraud and abuse technique

- A. B. C. D. E. F. G.

A federal grand jury in Fort Lauderdale claimed that four executives of a rental-car franchise modified a computer-billing program to add five gallons to the actual gas tank capacity of their vehicles. Over three years, 47,000 customers who returned a car without topping it off ended up paying an extra $2 to $15 for gasoline.

- A. B. C. D. E. F. G.

Cyber-attacks left high-profile sites such as Amazon.com, eBay, Buy.com, and CNN Interactive staggering under the weight of tens of thousands of bogus messages that tied up the retail sites computers and slowed the news sites operations for hours.

- A. B. C. D. E. F. G.

eBay customers were notified by e-mail that their accounts had been compromised and were being restricted unless they re-registered using an accompanying hyperlink to a Web page that had eBays logo, home page design, and internal links. The form had a place for them to enter their credit card data, ATM PINs, Social Security number, date of birth, and their mothers maiden name. Unfortunately, eBay hadnt sent the e-mail.

- A. B. C. D. E. F. G.

America Online subscribers received a message offering free software. Users who opened the attachments unknowingly unleashed a program hidden inside another program that secretly copied the subscribers account name and password and forwarded them to the sender .

- A. B. C. D. E. F. G.

Rajendrasinh Makwana, an Indian citizen and IT contractor who worked at Fannie Maes Maryland facility, was terminated at 1:00 P.M. on October 24. Before his network access was revoked, he created a program to wipe out all 4,000 of Fannie Maes servers on the following January 31.

A.

Salami technique

B.

Trojan horse

C.

Spoofing

D.

Denial of service attack

E.

Pretexting

F.

Time/logic bomb

G.

Phishing

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Accounting for Non-Accounting Students

Authors: John R. Dyson

8th Edition

273722972, 978-0273722977

More Books

Students also viewed these Accounting questions

Question

Define Management or What is Management?

Answered: 1 week ago

Question

What do you understand by MBO?

Answered: 1 week ago

Question

What is meant by planning or define planning?

Answered: 1 week ago

Question

Define span of management or define span of control ?

Answered: 1 week ago