Professional Documents
Culture Documents
AIS Chapter 9
AIS Chapter 9
Chapter 9
Computer Fraud and Abuse
Techniques
• A) hacking.
• B) spamming.
• C) posing.
• D) hijacking.
• A) hacking.
• B) spamming.
• C) posing.
• D) hijacking.
• A) hacking.
• B) spamming.
• C) posing.
• D) hijacking.
• A) hacking.
• B) spamming.
• C) posing.
• D) hijacking.
Due to the increased incidence of fraud and identity theft, we are asking all bank customers
to verify their account information on the following Web page: www.antifraudbigbank.com
Please confirm your account information as soon as possible. Failure to confirm your
account information will require us to suspend your account until confirmation is made.
Justin should:
Notify all employees and management that the email is fraudulent and that no information
should be entered on the indicated website.
Launch an education program for all employees and management about computer fraud
practices that could target their business.
Immediately alert all customers about the email and ask them to forward any suspicious
email to the bank security team. But this needs to be done via the bank’s web site, not by
an email message. Banks should never use email in ways similar to this type of attack.
Notify and cooperate with law enforcement agencies so the perpetrator can be arrested.
Notify the internet service provider ISP from which the email originated, demanding that
the perpetrator’s account be discontinued.
• This computer fraud and abuse technique is called phishing. Its purpose is to get
the information need to commit identity theft.