Explain the following techniques which are used to commit computer frauds.
i. Cracking vi. Salami technique
ii Hacking vii. Spamming
iii Logic time bomb
viii. Trojan horse
iv Password cracking
v Piggy backing
The cracking technique is unauthorized access to and use of computer system, usually means of a personal computer and a telecommunication network. Crackers are hackers with malicious intentions.
Hacking is unauthorized access to and use of computer systems, usually means of a personal computer and telecommunication network. Hackers do not intend to cause any damage.
iii) Logic time bomb
Program that lies idle until some specified circumstance or a particular time trigger it. Once triggered, the bomb sabotages the system destroying programs, data or both.
iv) Password cracking
Intruder penetrates a system‘s defence, steals the file containing valid passwords, decrypts them, and then uses them to gain access to system resources such as programs, files, and data.
v) Piggy backing
Tapping into a telecommunication line and latching on to a legitimate user before he logs into the system; legitimate user unknowingly carries perpetrator into the system.
vi) Salami technique
Ting slices of money are stolen over a period of time (expenses are increased a fraction of percent; increments are placed in a dummy account and later pocketed the perpetrator)
E-mailing the same message to every one on one or move use net news groups or LISTSERV lists.
viii) Trojan horse
Unauthorized computer instructions in an authorized and properly functioning program.
Segment of executable code that attaches itself to software, replicates itself, and spreads to other systems or files. Triggered a predefined event, a virus damages system resources or displays a message on the monitor.
Similar to a virus, except that it is a program rather than a code segment hidden in a host program. A worm also copies and actively transmits itself directly to other systems. It usually does not live long, but it is quite destructive while it is alive.