copyright © pearson education limited 2015. computer fraud and abuse techniques chapter 6 6-1

17
Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Upload: drusilla-wade

Post on 16-Dec-2015

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Computer Fraud and Abuse Techniques

Chapter 6

6-1

Page 2: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Learning Objectives

•Compare and contrast computer attack and abuse tactics.

•Explain how social engineering techniques are used to gain physical or logical access to computer resources.

•Describe the different types of malware used to harm computers.

6-2

Page 3: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Types of Attacks

•Hacking▫Unauthorized access, modification, or use

of an electronic device or some element of a computer system

•Social Engineering▫Techniques or tricks on people to gain

physical or logical access to confidential information

•Malware▫Software used to do harm

6-3

Page 4: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Hacking

▫Hijacking Gaining control of a computer to carry out

illicit activities▫Botnet (robot network)

Zombies Bot herders Denial of Service (DoS) Attack Spamming Spoofing

Makes the communication look as if someone else sent it so as to gain confidential information.

6-4

Page 5: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Forms of Spoofing

•E-mail spoofing•Caller ID spoofing•IP address spoofing•Address Resolution (ARP) spoofing•SMS spoofing•Web-page spoofing (phishing)•DNS spoofing

6-5

Page 6: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Hacking with Computer Code•Cross-site scripting (XSS)

▫Uses vulnerability of Web application that allows the Web site to get injected with malicious code. When a user visits the Web site, that malicious code is able to collect data from the user.

•Buffer overflow attack▫Large amount of data sent to overflow the input

memory (buffer) of a program causing it to crash and replaced with attacker’s program instructions.

•SQL injection (insertion) attack▫Malicious code inserted in place of a query to

get to the database information 6-6

Page 7: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Other Types of Hacking•Man in the middle (MITM)

▫Hacker is placed in between a client (user) and a host (server) to read, modify, or steal data.

•Piggybacking•Password cracking•War dialing and driving•Phreaking•Data diddling•Data leakage•podslurping 6-7

Page 8: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Hacking Used for Embezzlement•Salami technique:

▫Taking small amounts at a time Round-down fraud

•Economic espionage▫Theft of information, intellectual property

and trade secrets•Cyber-extortion

▫Threats to a person or business online through e-mail or text messages unless money is paid

6-8

Page 9: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Hacking Used for Fraud

•Internet misinformation•E-mail threats•Internet auction •Internet pump and dump•Click fraud•Web cramming•Software piracy

6-9

Page 10: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Social Engineering Techniques• Identity theft

▫ Assuming someone else’s identity

• Pretexting▫ Using a scenario to trick

victims to divulge information or to gain access

• Posing▫ Creating a fake business to

get sensitive information• Phishing

▫ Sending an e-mail asking the victim to respond to a link that appears legitimate that requests sensitive data

• Pharming▫ Redirects Web site to a

spoofed Web site

• URL hijacking▫ Takes advantage of

typographical errors entered in for Web sites and user gets invalid or wrong Web site

• Scavenging▫ Searching trash for

confidential information• Shoulder surfing

▫ Snooping (either close behind the person) or using technology to snoop and get confidential information

• Skimming Double swiping credit card

• Eeavesdropping6-10

Page 11: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Why People Fall Victim• Compassion

▫ Desire to help others• Greed

▫ Want a good deal or something for free• Sex appeal

▫ More cooperative with those that are flirtatious or good looking

• Sloth▫ Lazy habits

• Trust▫ Will cooperate if trust is gained

• Urgency▫ Cooperation occurs when there is a sense of immediate need

• Vanity▫ More cooperation when appeal to vanity

6-11

Page 12: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Minimize the Threat of Social Engineering

•Never let people follow you into restricted areas

•Never log in for someone else on a computer

•Never give sensitive information over the phone or through e-mail

•Never share passwords or user IDs•Be cautious of someone you don’t know

who is trying to gain access through you6-12

Page 13: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Types of Malware• Spyware

▫ Secretly monitors and collects information

▫ Can hijack browser, search requests

▫ Adware • Keylogger

▫ Software that records user keystrokes

• Trojan Horse▫ Malicious computer

instructions in an authorized and properly functioning program

• Trap door ▫ Set of instructions that

allow the user to bypass normal system controls

• Packet sniffer▫ Captures data as it

travels over the Internet• Virus

▫ A section of self-replicating code that attaches to a program or file requiring a human to do something so it can replicate itself

• Worm▫ Stand alone self

replicating program6-13

Page 14: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Cellphone Bluetooth Vulnerabilities

•Bluesnarfing▫Stealing contact lists, data, pictures on

bluetooth compatible smartphones•Bluebugging

▫Taking control of a phone to make or listen to calls, send or read text messages

6-14

Page 15: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Key Terms• Hacking• Hijacking• Botnet• Zombie• Bot herder• Denial-of-service (DoS)

attack• Spamming• Dictionary attack• Splog• Spoofing• E-mail spoofing• Caller ID spoofing• IP address spoofing• MAC address

• Address Resolution Protocol (ARP) spoofing

• SMS spoofing• Web-page spoofing• DNS spoofing• Zero day attack• Patch• Cross-site scripting (XSS)• Buffer overflow attack• SQL injection (insertion)

attack• Man-in-the-middle (MITM)

attack• Masquerading/

impersonation• Piggybacking 6-15

Page 16: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Key Terms (continued)• Password cracking• War dialing• War driving• War rocketing• Phreaking• Data diddling• Data leakage• Podslurping• Salami technique• Round-down fraud• Economic espionage• Cyber-extortion• Cyber-bullying• Sexting

• Internet terrorism• Internet misinformation• E-mail threats• Internet auction fraud• Internet pump-and-dump

fraud• Click fraud• Web cramming• Software piracy• Social engineering• Identity theft• Pretexting• Posing• Phishing• vishing 6-16

Page 17: Copyright © Pearson Education Limited 2015. Computer Fraud and Abuse Techniques Chapter 6 6-1

Copyright © Pearson Education Limited 2015.

Key Terms (continued)• Carding• Pharming• Evil twin• Typosquatting/URL

hijacking• QR barcode replacements• Tabnapping• Scavenging/dumpster

diving• Shoulder surfing• Lebanese looping• Skimming• Chipping• Eavesdropping• Malware• Spyware

• Adware• Torpedo software• Scareware• Ransomware• Keylogger• Trojan horse• Time bomb/logic bomb• Trap door/back door• Packet sniffers• Steganography program• Rootkit• Superzapping• Virus• Worm• Bluesnarfing• Bluebugging

6-17