Question

In: Accounting

Explain the following terms a) Eavesdropping b) Identity theft c) Salami technique d) Scavenging e) Hacking...

Explain the following terms

a) Eavesdropping b) Identity theft c) Salami technique d) Scavenging e) Hacking f) Skimming g) Social engineering h) Trojan horse i) Worm j) Vishing

Solutions

Expert Solution

Solution:

a) Eavesdropping - The term refers to listening of private voice using wire tap,It is an act of theft of information whenever it is trasmitted over a network by any connected device. Unsecured network communications are generally responsible for Eavesdropping attack.

b) Indentity Theft - The term refers to use of other person's identity in an unethical ways and without that person's permission for taking financial advantage or credits in that person's name and also using that person's information like name , identity number to commit a fraud or crime.

c) Salami technique - The meaning of this term involves slicing of small amount of money from a computerized transaction.It is a practice of stealing the money in a very small amount by taking advantage of rounding down techinqes.Salami techniques is usually used to carryout illegal activities.

d) Scavenging - The term refers to an act of obtaining knowledge of sensitive information by an unauthorised ways by searching in a network or through data residue in a system.

e) Hacking - The term refers to  use of computers to commit fradulent acts such a stealing data, other frauds by identifying weakness in the network or in the Computer system and to obtain unauthorised access from exploiting that weakness.

f) Skimming - The term refers to the process by which indentity thieves can make fradulent transactions by obtaining information from a cardholder. Many different ways used by the fraudsters for obtaining card information one of this is a small device called Skimmer.

g)Social engineering - The term refers to act of influencing people in a such a way that , they give up their confidential information such various passwords of computers or Bank information and then using such information for committing fradulent activities.

h) Trojen horse - The term refers to malicious program that are hidden in any computer system, which are able to change or steal the passwords , can make unauthorised changes to password protected files, can give unauthorised access to illicit user .

i) Worms - The term refers to programs which can copy its self to anolther machine on the network. Worms can be detected easily as compared to the virus.

j) Vishing - The term is used as short form for Voice phishing.Its a fradulent act of influencing people to share their Financial or confidential information over the phone.


Related Solutions

Consider the cross: A/a; b/b; C/c; D/d; E/e x A/a; B/b; c/c; D/d; e/e a) what...
Consider the cross: A/a; b/b; C/c; D/d; E/e x A/a; B/b; c/c; D/d; e/e a) what proportion of the progeny will phenotypically resemble the first parent? b) what proportion of the progeny will genotypically resemble neither parent?
Given the following knowledge base: a <- b^c. b <- d^e. b <- g^e. c <-...
Given the following knowledge base: a <- b^c. b <- d^e. b <- g^e. c <- e. d. e. ƒ <- a^g. Which of the following would be the trace of resolved atoms assuming a bottoms-up proof procedure? Select one: a. {a,b,c,e,g} b. {a,b,c,e,d} c. {g,e,b,e,c,a} d. None of these options Constraint Satisfaction Problem (CSP) is consists of a set of _________________. Select one: a. Variables, heuristics, and solutions b. Variables, domains, and backtracking c. Variables, domains, and constraints d....
Define each of the following terms: a. Will. b. Estate. c. Intestate. d. Probate laws. e....
Define each of the following terms: a. Will. b. Estate. c. Intestate. d. Probate laws. e. Trust.
Find the proof of the following ((a ∧ b) ∨ (c ∧ d)), (a → e),...
Find the proof of the following ((a ∧ b) ∨ (c ∧ d)), (a → e), (b → f), (c → f), (d → e) ⊢ e
Compare hepatitis A, B, C, D, and E in terms of source of infection, incubation period,...
Compare hepatitis A, B, C, D, and E in terms of source of infection, incubation period, acute disease manifestations, development of chronic disease, and the carrier state.
In your own words, define or explain the follow­ing terms or symbols: (a) mL; (b) % by mass; (c) °C; (d) density; (e) element.
In your own words, define or explain the follow­ing terms or symbols:(a) mL; (b) % by mass; (c) °C; (d) density; (e) element.
For the relation R(A,B,C,D,E) with the following Functional Dependencies: A → B, A → C, BC...
For the relation R(A,B,C,D,E) with the following Functional Dependencies: A → B, A → C, BC → D, AC → E, CE → A, list all non-trivial FDs following from the above.    Generate all possible keys for R. Check whether R is in 3NF. If it is in 3NF, explain the criteria you used. If it is not in 3NF, convert it into 3NF, showing the new relations and their FDs.
Explain the meaning of the following terms: a) placebo b) double-blind c) confounding d) response
Explain the meaning of the following terms: a) placebo b) double-blind c) confounding d) response
Let A = {a, b, c, d} and B = {b, d, e}. Write out all...
Let A = {a, b, c, d} and B = {b, d, e}. Write out all of the elements of the following sets. (a) B ∩ ∅ (b) A ∪ B (c) (A ∩ B) × B (d) P(A\B) (e) {X ∈ P(A) | |X| ≤ 3}
What are the values of a, b, c, d, and e after the following statements? int...
What are the values of a, b, c, d, and e after the following statements? int a = 5, b = 2, c = 8, d = 7, e = 4; int x = c - b + a; a = a + x - d; b = c * d - x; c = e + a / 2; d = x - c * a; e = x + d - c;
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT