Abstract
This research will describe an aspect of crime known as salami fraud, the salami technique, or simply, a salami attack. Though most often associated with electronic banking and electronic data interchange fraud, the concept can be applied to other scenarios with little relation to computing. In general, salami attacks take place when small, almost immaterial, amounts of assets are systematically acquired from a large number of sources. In such miniscule denominations, they frequently exist just below the threshold of perception (and detection, for that matter). The result is an ongoing accumulation of assets in such a manner that the victims, whose assets are vanishing, fail to even notice.
Khamis, 25 Mac 2010
salami attack
Dicatat oleh umairah di 8:46 PTG
Langgan:
Catat Ulasan (Atom)
0 ulasan:
Catat Ulasan