CP102 Lecture Notes - Lecture 9: Master Boot Record, Boot Sector, Grey Hat

39 views2 pages
School
Course
Professor

Document Summary

Identity theft occurs when a thief steals personal information. Packet analyzer is a program deployed by hackers that looks at each packet it travels on the internet. Trojan horse is a program that appears to be something useful or desirable but does something malicious in the background without your knowledge. Backdoor programs and rootkits are programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. Zombie is used to launch denial of service attacks on other computers. Denial of service attacks are legitimate users denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer where they have been taken over as a zombie. Distributed denial of service attack launches denial of service attacks from more than one zombie at the same time. Botnet is a large group of software programs that run autonomously on zombie computers.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents