MGCR 331 Lecture Notes - Intrusion Detection System, Information Security, Click Fraud
Document Summary
Data harvesters: cybercriminals who infiltrate systems and collect data for illegal resale. Cash-out fraudsters: firms that purchase assets from data harvesters. Actions may include stolen credit card numbers to purchase goods, creating fake accounts via identity fraud, and more. Hackers may also infiltrate computer systems hop from hardware to hardware. Botnets of zombie computers: hordes of surreptitiously infiltrated computers, linked and controlled remotely: click fraud, spam sending, or distributed denial of service (ddos) -- Effectively shutting down web sites by overwhelming them with a crushing load of seemingly legitimate requests sent simultaneously by thousands of machines. Might be insiders, rivals, or foreign governments. Cyber warfare a legit threat (terrorism, cut of power, cause explosions, etc. ) Stuxnet: infiltrated iranian nuclear facilities and reprogramed the industrial control software operating hundreds of uranium-enriching centrifuges. Made the devices spin so fast that they effectively destroyed themselves --- and even made it look like nothing was out of place.