Professional Documents
Culture Documents
Identify the computer fraud and abuse technique used in each the following actual
examples of computer wrongdoing.
Each of these real-world scenarios were taken from news accounts of computer fraud and
abuse. There may be other valid answers, but the answers shown below are what the
news accounts and experts investigating the case said were used to perpetrate the fraud.
Hacking
Password cracking
SMS spoofing
Salami technique
Round-down fraud
Cyber-extortion
Denial-of-service attack
used to perpetrate cyberterrorism
Phishing
Pharming
Evil twin
Key logging
Trojan horse
Time/logic bomb
Pretexting
Worm/virus. Although it
was called the Melissa
virus, it was actually a
worm
Scareware