AIS Chapter 5
AIS Chapter 5
Hacking
Social Engineering
Malware
Botnet—Robot Network. Hijacking is gaining control of a computer to carry out illicit activities without
the user’s knowledge.
Constant stream of requests made to a Web-server (usually via a Botnet) that overwhelms and shuts
down service
Spamming
is simultaneously sending the same unsolicited message to many people at the same time, often in
an attempt to sell something.
Spammers also stage dictionary attacks (also called direct harvesting attacks). Spammers use
special software to guess e-mail addresses at a company and send blank e-mail messages.
Messages not returned usually have valid e-mail addresses and are added to spammer e-mail
lists.
Spoofing
Making an electronic communication look as if it comes from a trusted official source to lure the
recipient into providing information
Types of Spoofing
Caller-ID
IP address
Forged IP address to conceal identity of sender of data over the Internet or to impersonate another
computer system
Allows a computer on a LAN to intercept traffic meant for any other computer on the LAN
SMS
Incorrect number or name appears, similar to caller-ID but for text messaging
Web page
DNS
Intercepting a request for a Web service and sending the request to a false service
Hacking Attacks
zero-day attack (or zero-hour attack) is an attack between the time a new software vulnerability is
discovered and the time a software developer releases a patch that fixes the problem.
Unwanted code is sent via dynamic Web pages disguised as user input.
Buffer Overflow
Data is sent that exceeds computer capacity causing program instructions to be lost and replaced with
attacker instructions.
Man-in-the-Middle
1. The clandestine use of a neighbor’s Wi-Fi network; this can be prevented by enabling the security
features in the wireless network.
2. Tapping into a communications line and electronically latching onto a legitimate user before the user
enters a secure system; the legitimate user unknowingly carries the perpetrator into the system.
3. An unauthorized person following an authorized person through a secure door, bypassing physical
security controls such as keypads, ID cards, or biometric identification scanners.
Password Cracking
War Dialing
Phreaking
Data Diddling
Data Leakage
Podslurping is using a small device with storage capacity, such as an iPod or Flash drive, to download
unauthorized data.
Salami Technique
Economic Espionage
Internet Terrorism
Cyber-Bullying
Internet, cell phones, or other communication technologies to support deliberate, repeated, and
hostile behavior that torments, threatens, harasses, humiliates, embarrasses, or otherwise
harms another person.
Sexting is exchanging sexually explicit text messages and revealing pictures, usually by means of a
phone. One particularly degrading form of cyber-bullying is posting or sharing these pictures and
messages with people who were never intended to see or read them.
Internet Terrorism
Internet Auction
Internet Pump-and-Dump
Using the Internet to pump up the price of a stock and then selling it
Software piracy is the unauthorized copying or distribution of copyrighted software. Three frequent
forms of software piracy include:
(3) loading software on a network server and allowing unrestricted access to it in violation of the
software license agreement.
Social Engineering Techniques
Identity Theft
Pretexting
Inventing a scenario that will lull someone into divulging sensitive information
Posing
Phishing
Posing as a legitimate company asking for verification type information: passwords, accounts,
usernames
Pharming
Carding refers to activities performed on stolen credit cards, including making a small online purchase
to determine whether the card is still valid and buying and selling stolen credit card numbers.
Typesquatting
Typographical errors when entering a Web site name cause an invalid site to be accessed
Tabnapping
Scavenging
Shoulder Surfing
Lebanese Loping
Skimming
Eavesdropping
Type of Malware
Spyware
Secretly monitors and collects personal information about users and sends it to someone else
Adware
Pops banner ads on a monitor, collects information about the user’s Web-surfing, and spending habits,
and forward it to the adware creator
Scareware is software that is often malicious, is of little or no benefit, and is sold using scare tactics.
That is, it uses fear to motivate some sort of user action. The most common scare tactic is a dire warning
that a computer is infected with a virus, spyware, or some other catastrophic problem. Some scareware
even warns that a user’s job, career, or marriage is at risk.
Key logging
Records computer activity, such as a user’s keystrokes, e-mails sent and received, Web sites visited, and
chat session participation
Trojan Horse
Idle until triggered by a specified date or time, by a change in the system, by a message sent to the
system, or by an event that does not occur
More Malware
A way into a system that bypasses normal authorization and authentication controls
Packet Sniffers
Rootkit
Used to hide the presence of trap doors, sniffers, and key loggers; conceal software that originates a
denial-of-service or an e-mail spam attack; and access user names and log-in information
Superzapping
Unauthorized use of special system programs to bypass regular system controls and perform illegal acts,
all without leaving an audit trail
computer worm is a self-replicating computer program similar to a virus, with some exceptions:
1. A virus is a segment of code hidden in or attached to a host program or executable file, whereas a
worm is a stand-alone program.
2. A virus requires a human to do something (run a program, open a file, etc.) to replicate itself, whereas
a worm does not and actively seek to send copies of itself to other network devices.
Bluesnarfing - Stealing (snarfing) contact lists, images, and other data using flaws in bluetooth
applications. Before Bluetooth connections can be made \, the person contacted must agree to accept
the link.