Chapter 5 part 2

Chapter 5 part 2 - Computer instruction alteration fraud...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 5 part 2 Act of capturing Packet sniffing Worm diff virus Stand alone program HOW CAN ORG IMPROVE FRAUD DECT METHODS Implement fraud hotline Pc fraud has been cat. Into several differ classifactions Dispursement fraud Network engineer claims to be testing Social engeneering Software pricacyt, superzapping which type pc fraud
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Computer instruction alteration fraud What is spyware Software that monitors computing habits 15,000 credit cards Data leakage Type of pc graud hacked into nbankss complemntray weather phone Phreakers Name of prpart of program that remains idle Logic timebomb (20/20)...
View Full Document

Page1 / 2

Chapter 5 part 2 - Computer instruction alteration fraud...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online