MIS 301 Chapter Notes - Chapter 15: Denial-Of-Service Attack, Botnet, Ticket Resale
Document Summary
Chapter 15: information security: barbarians at the gateway (and just about everywhere else) Data harvesters: cybercriminals who infiltrate systems and collect data for illegal resale. Fraudsters: firms that purchase assets from data harvesters. Actions may include using stolen credit card numbers to purchase goods, creating fake accounts via identity fraud, and more. Botnets: hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks. Distributed denial of service (ddos): an attack where a firm"s computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site"s use. Hacktivists: a protestor seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage. Hacker: a term that, depending on the context, may be applied to either 1) someone who breaks into computer systems, or 2) to a particularly clever programmer. White hat hacker: someone who uncovers computer weaknesses without exploiting them.