In: Accounting
Explain the following terms
a) Eavesdropping b) Identity theft c) Salami technique d) Scavenging e) Hacking f) Skimming g) Social engineering h) Trojan horse i) Worm j) Vishing
Solution:
a) Eavesdropping - The term refers to listening of private voice using wire tap,It is an act of theft of information whenever it is trasmitted over a network by any connected device. Unsecured network communications are generally responsible for Eavesdropping attack.
b) Indentity Theft - The term refers to use of other person's identity in an unethical ways and without that person's permission for taking financial advantage or credits in that person's name and also using that person's information like name , identity number to commit a fraud or crime.
c) Salami technique - The meaning of this term involves slicing of small amount of money from a computerized transaction.It is a practice of stealing the money in a very small amount by taking advantage of rounding down techinqes.Salami techniques is usually used to carryout illegal activities.
d) Scavenging - The term refers to an act of obtaining knowledge of sensitive information by an unauthorised ways by searching in a network or through data residue in a system.
e) Hacking - The term refers to use of computers to commit fradulent acts such a stealing data, other frauds by identifying weakness in the network or in the Computer system and to obtain unauthorised access from exploiting that weakness.
f) Skimming - The term refers to the process by which indentity thieves can make fradulent transactions by obtaining information from a cardholder. Many different ways used by the fraudsters for obtaining card information one of this is a small device called Skimmer.
g)Social engineering - The term refers to act of influencing people in a such a way that , they give up their confidential information such various passwords of computers or Bank information and then using such information for committing fradulent activities.
h) Trojen horse - The term refers to malicious program that are hidden in any computer system, which are able to change or steal the passwords , can make unauthorised changes to password protected files, can give unauthorised access to illicit user .
i) Worms - The term refers to programs which can copy its self to anolther machine on the network. Worms can be detected easily as compared to the virus.
j) Vishing - The term is used as short form for Voice phishing.Its a fradulent act of influencing people to share their Financial or confidential information over the phone.