MSCI 2130 Chapter Notes - Chapter 17: Click Fraud, Botnet, Ticket Resale

59 views4 pages

Document Summary

Factors that can amplify a firm"s vulnerability of a breach: personal issues, technology problems, procedural factors, operational issues. Constant vigilance regarding security needs to be: part of one"s individual skill set, a key component in an organization"s culture. Account theft and illegal funds transfer: some hackers steal data for personal use, data harvesters sell to cash-out fraudsters. Data harvesters cybercriminals who infiltrate systems and collect data for illegal resale. Cash-out fraudsters criminals that purchase assets from data harvesters to be used for illegal financial gain. Compromising computing assets for use in other crimes: botnets send spam, launch click fraud efforts or stage distributed denial of service (ddos) attacks. Botnets surreptitiously infiltrated computers, controlled remotely. Ddos attacks shutting down web sites with a crushing load of seemingly legitimate requests. White hat hackers uncover computer weaknesses without exploiting them: contribute to improving system security. Black hat hackers computer criminals who exploit a system"s weakness for personal gain.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents