1. Data Diddling:
This means the changing of data going into or out of a computer for example a student’s breaks into his/her university grade recording system and changes the grades he/she earned in last semester’s classes, thus raising his/her grade point average.
This means the changing of data going into or out of a computer for example a student’s breaks into his/her university grade recording system and changes the grades he/she earned in last semester’s classes, thus raising his/her grade point average.
2. Salami Slicing:
A form of data diddling that occurs when a person shaves small amounts from financial accounts and deposits them in personal account, for example a bank employee deposits a few rupees from each of the thousands of account into an account set up in a fictitious name. The amounts are too small to raise flags, but over time the thief collects a substantial sum.
A form of data diddling that occurs when a person shaves small amounts from financial accounts and deposits them in personal account, for example a bank employee deposits a few rupees from each of the thousands of account into an account set up in a fictitious name. The amounts are too small to raise flags, but over time the thief collects a substantial sum.
3. Phreaking:
Crime committed against telephone companies by the use of computers with the goal of making free distance calls, impersonating directory assistance or other operator services diverting calls to numbers of the perpetrator’s choice or otherwise disrupting telephone service for subscribers.
Crime committed against telephone companies by the use of computers with the goal of making free distance calls, impersonating directory assistance or other operator services diverting calls to numbers of the perpetrator’s choice or otherwise disrupting telephone service for subscribers.
4. Cloning:
Cellular phone fraud in which scanners are used to steal the electronic serial numbers of Cellular phones which are used for billing purposes and are broadcast as calls are made. With stolen serial numbers clones can be made to make free calls that a are billed to the owner of the original cell phone.
Cellular phone fraud in which scanners are used to steal the electronic serial numbers of Cellular phones which are used for billing purposes and are broadcast as calls are made. With stolen serial numbers clones can be made to make free calls that a are billed to the owner of the original cell phone.
5. Carding:
Refers to the precipice of stealing credit numbers online to be resold or used to charge merchandise against victim’s account.
Refers to the precipice of stealing credit numbers online to be resold or used to charge merchandise against victim’s account.
6. Piggybacking:
The act of simply standing in behind a card user at an automated shoulder surfing teller machine (ATM), looking over person’s shoulder, and memorizing the cards personal identification number (PIN). With the right equipment the stolen numbers can then be placed on counterfeit access cards and used to withdraw cash from the victim’s account.
The act of simply standing in behind a card user at an automated shoulder surfing teller machine (ATM), looking over person’s shoulder, and memorizing the cards personal identification number (PIN). With the right equipment the stolen numbers can then be placed on counterfeit access cards and used to withdraw cash from the victim’s account.
Comments
Post a Comment