click below
click below
Normal Size Small Size show me how
Computer Crime
Chapter 5-Identity Theft Techniques
| Question | Answer |
|---|---|
| Which is more common with identity theft: targets of opportunity or specific individuals being targeted? | targets of opportunity |
| Is it legal for state drivers' licenses to display social security numbers? | No. The Intelligence Reform and Terrorism Prevention Act of 2004 prohibits states from displaying your SSN on drivers' licenses or motor vehicle registrations. |
| Possession of spyware is illegal | false |
| Someone must physically have access to your credit or debit card to steal the data | No. Some cards have RFID chips that can be read from a moderate distance. |
| What is shill bidding? | Shill bidding occurs when a perpetrator establishes several fake buyer accounts and uses those to bid on their own item, artificially inflating the going price and creating the illusion that the item is in high demand. |
| What is a pump and dump? | A pump and dump is a fraud scheme that artificially inflates the value of low valued stocks. |
| What is foot printing? | The process of gathering information prior to an attempt to hack into a system. |
| What is a brute force attack? | A brute force attack is when a software tool tries every single permutation of letters, numbers, and symbols possible to crack the password. |
| What is SQL injection? | A process whereby hackers enter SQL code directly into web forms such as login fields or an address bar in your browser. the goal is to trick the web page into submitting that SQL code to the database, thus executing that code. |
| What is a sniffer? | A sniffer is a program and/or device that monitors all information passing through a computer network. It sniffs the data passing through the network off the wire and determines where the data is going, where it's coming from, and what it is. |