MGCR 331 Lecture Notes - Intrusion Detection System, Information Security, Click Fraud

76 views3 pages

Document Summary

Data harvesters: cybercriminals who infiltrate systems and collect data for illegal resale. Cash-out fraudsters: firms that purchase assets from data harvesters. Actions may include stolen credit card numbers to purchase goods, creating fake accounts via identity fraud, and more. Hackers may also infiltrate computer systems hop from hardware to hardware. Botnets of zombie computers: hordes of surreptitiously infiltrated computers, linked and controlled remotely: click fraud, spam sending, or distributed denial of service (ddos) -- Effectively shutting down web sites by overwhelming them with a crushing load of seemingly legitimate requests sent simultaneously by thousands of machines. Might be insiders, rivals, or foreign governments. Cyber warfare a legit threat (terrorism, cut of power, cause explosions, etc. ) Stuxnet: infiltrated iranian nuclear facilities and reprogramed the industrial control software operating hundreds of uranium-enriching centrifuges. Made the devices spin so fast that they effectively destroyed themselves --- and even made it look like nothing was out of place.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents