Management information and control system question and answer

A Management Information System ICT Revision Questions and Answers

Explain the following techniques which are used to commit computer frauds.

i. Cracking             vi. Salami technique
ii Hacking               vii. Spamming

iii Logic time bomb

viii. Trojan horse

iv Password cracking
ix. Virus

v Piggy backing
x. Worm

i) Cracking
The cracking technique is unauthorized access to and use of computer system, usually means of a personal computer and a telecommunication network. Crackers are hackers with malicious intentions.

ii) Hacking
Hacking is unauthorized access to and use of computer systems, usually means of a personal computer and telecommunication network. Hackers do not intend to cause any damage.

iii) Logic time bomb
Program that lies idle until some specified circumstance or a particular time trigger it. Once triggered, the bomb sabotages the system destroying programs, data or both.

iv) Password cracking
Intruder penetrates a system‘s defence, steals the file containing valid passwords, decrypts them, and then uses them to gain access to system resources such as programs, files, and data.

v) Piggy backing

Tapping into a telecommunication line and latching on to a legitimate user before he logs into the system; legitimate user unknowingly carries perpetrator into the system.

vi) Salami technique
Ting slices of money are stolen over a period of time (expenses are increased a fraction of percent; increments are placed in a dummy account and later pocketed the perpetrator)

vii) Spamming
E-mailing the same message to every one on one or move use net news groups or LISTSERV lists.

viii) Trojan horse
Unauthorized computer instructions in an authorized and properly functioning program.

ix) Virus
Segment of executable code that attaches itself to software, replicates itself, and spreads to other systems or files. Triggered a predefined event, a virus damages system resources or displays a message on the monitor.

x) Worm
Similar to a virus, except that it is a program rather than a code segment hidden in a host program. A worm also copies and actively transmits itself directly to other systems. It usually does not live long, but it is quite destructive while it is alive.

(Visited 12 times, 1 visits today)
Share this on:

Leave a Reply

Your email address will not be published.