Salamitechniquejscavengingktrojanhorse a

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: t answers the question. (6 points total) 8) Using the fraud traingle, briefly describe when fraud is more likely to occur. (2 points) 9) Below is a list of computer fraud and abuse techniques. Match the technique with the scenario. (2 points) A. Botnet B. Denial of service attack C. data diddling D. Data leakage E. Identity theft F. Round down G. Phishing H. Worm I. Salami technique J. Scavenging K. Trojan horse ________ A type of attack on a network that is designed to bring the network to be overloaded...
View Full Document

This document was uploaded on 03/13/2014.

Ask a homework question - tutors are online