MGCR 331 Chapter Notes - Chapter 17: Multi-Factor Authentication, Fireeye, Malware

52 views6 pages

Document Summary

Security: barbarians at the gateway (and just about everywhere else) Malware that would collect every credit card used in the company"s stores. Fireeye, their security software, sent notifications and they were ignored by the company, and had turned off the function that would instantly delete malware. 40 million cards used were stolen and additional info on 70 million clients was exposed. Thriving cybercrime underworld market in which data harvesters sell to cash-out fraudsters: criminals who might purchase data from the harvesters in order to buy (then resell) goods using stolen credit cards or create false accounts via identity theft. Threats can come from both within the firm as well as from the outside. Cybercriminals operate in an increasingly sophisticated ecosystem where data harvesters and tool peddlers leverage sophisticated online markets to sell to cash- out fraudsters and other crooks. Technical and legal complexity make pursuit and prosecution difficult.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents