This technique causes small amounts of assets especially money to be removed from a larger pool over a period of time. Usually, the amount stolen each time is so small that the victim of the salami fraud never even notices.
A clever thief can use a Trojan horse to hide a salami program that puts all of the rounded off values into his account. A tiny percentage of pennies may not sound like much until you add up thousands of accounts, month after month.
Kavungya answered the question on May 17, 2019 at 09:28
- Describe Logic Bombs.(Solved)
Describe Logic Bombs.
Date posted: May 17, 2019. Answers (1)
- What is Data Diddling?(Solved)
What is Data Diddling?
Date posted: May 17, 2019. Answers (1)
- Define IP Spoofing.(Solved)
Define IP Spoofing.
Date posted: May 17, 2019. Answers (1)
- Describe Password Sniffing.(Solved)
Describe Password Sniffing.
Date posted: May 17, 2019. Answers (1)
- Define Rootkits.(Solved)
Define Rootkits.
Date posted: May 17, 2019. Answers (1)
- Define Keyloggers.(Solved)
Define Keyloggers.
Date posted: May 17, 2019. Answers (1)
- Excess Privileges.(Solved)
Excess Privileges.
Date posted: May 17, 2019. Answers (1)
- Define a Zero Day Attack.(Solved)
Define a Zero Day Attack.
Date posted: May 17, 2019. Answers (1)
- Describe social engineering.(Solved)
Describe social engineering.
Date posted: May 17, 2019. Answers (1)
- What is Pharming?(Solved)
What is Pharming?
Date posted: May 17, 2019. Answers (1)
- What is Phishing?(Solved)
What is Phishing?
Date posted: May 17, 2019. Answers (1)
- Define electronic spamming.(Solved)
Define electronic spamming.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting scanning attacks.(Solved)
Describe the ways of detecting scanning attacks.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Excess Privileges.(Solved)
Describe the ways of detecting Excess Privileges.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Data Diddling.(Solved)
Describe the ways of detecting Data Diddling.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.(Solved)
Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Timing Attacks.(Solved)
Describe the ways of detecting Timing Attacks.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Trap Doors.(Solved)
Describe the ways of detecting Trap Doors.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Software Piracy.(Solved)
Describe the ways of detecting Software Piracy.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Masquerading.(Solved)
Describe the ways of detecting Masquerading.
Date posted: May 17, 2019. Answers (1)