This technique causes small amounts of assets especially money to be removed from a larger pool over a period of time. Usually, the amount stolen each time is so small that the victim of the salami fraud never even notices.
A clever thief can use a Trojan horse to hide a salami program that puts all of the rounded off values into his account. A tiny percentage of pennies may not sound like much until you add up thousands of accounts, month after month.
Kavungya answered the question on May 17, 2019 at 09:28
-
Describe Logic Bombs.
(Solved)
Describe Logic Bombs.
Date posted:
May 17, 2019
.
Answers (1)
-
What is Data Diddling?
(Solved)
What is Data Diddling?
Date posted:
May 17, 2019
.
Answers (1)
-
Define IP Spoofing.
(Solved)
Define IP Spoofing.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe Password Sniffing.
(Solved)
Describe Password Sniffing.
Date posted:
May 17, 2019
.
Answers (1)
-
Define Rootkits.
(Solved)
Define Rootkits.
Date posted:
May 17, 2019
.
Answers (1)
-
Define Keyloggers.
(Solved)
Define Keyloggers.
Date posted:
May 17, 2019
.
Answers (1)
-
Excess Privileges.
(Solved)
Excess Privileges.
Date posted:
May 17, 2019
.
Answers (1)
-
Define a Zero Day Attack.
(Solved)
Define a Zero Day Attack.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe social engineering.
(Solved)
Describe social engineering.
Date posted:
May 17, 2019
.
Answers (1)
-
What is Pharming?
(Solved)
What is Pharming?
Date posted:
May 17, 2019
.
Answers (1)
-
What is Phishing?
(Solved)
What is Phishing?
Date posted:
May 17, 2019
.
Answers (1)
-
Define electronic spamming.
(Solved)
Define electronic spamming.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting scanning attacks.
(Solved)
Describe the ways of detecting scanning attacks.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Excess Privileges.
(Solved)
Describe the ways of detecting Excess Privileges.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Data Diddling.
(Solved)
Describe the ways of detecting Data Diddling.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.
(Solved)
Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Timing Attacks.
(Solved)
Describe the ways of detecting Timing Attacks.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Trap Doors.
(Solved)
Describe the ways of detecting Trap Doors.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Software Piracy.
(Solved)
Describe the ways of detecting Software Piracy.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Masquerading.
(Solved)
Describe the ways of detecting Masquerading.
Date posted:
May 17, 2019
.
Answers (1)