This preview shows page 1. Sign up to view the full content.
Unformatted text preview: t answers the question. (6 points total)
8) Using the fraud traingle, briefly describe when fraud is more likely to occur. (2 points) 9) Below is a list of computer fraud and abuse techniques. Match the technique with the scenario. (2 points)
A. Botnet B. Denial of service attack C. data diddling D. Data leakage
E. Identity theft F. Round down G. Phishing H. Worm
I. Salami technique J. Scavenging K. Trojan horse
________ A type of attack on a network that is designed to bring the network to be overloaded...
View Full Document
This document was uploaded on 03/13/2014.
- Spring '14