星期六, 11月 27, 2010

Computer Crimes

  • Bomb
    • Program to trigger damage
    • Scheduled to run at a later date
    • May be found in software for general public, especially shareware
  • Data diddling
    • Changing data before or as it enters the system
  • Denial of service attack (DOS)
    • Hackers bombard a site with more request for service than it can possible handle
    • Prevents legitimate users from accessing the site
    • Appearance of requests coming from many different sites simultaneously
  • Piggybacking
    • Original user does not sign off properly
    • Intruder gains accesses to files via the original user id
  • Salami technique
    • Embezzlement
  • Scavenging
    • Search garbage and recycling bins for personal information
  • Trapdoor
    • Illicit program left within a completed legitimate program
    • Permits unauthorized and unknown entry to the program
  • Trojan horse
    • Illegal instructions placed inside a legitimate program
    • Program does something useful and destructive at the same time
  • Zapping
    • Software to bypass security systems

推薦此文