BU415 Chapter Notes - Chapter 14: Botnet, Ticket Resale, Denial-Of-Service Attack

76 views5 pages
10 Oct 2014
School
Department
Course
Professor

Document Summary

Security of information systems must be an organization"s top priority. The vast majority of security breaches can be prevented. Different vendors, each with their own potential weaknesses, provide technology components that may be comprised by misuse, misconfiguration, or mismanagement. Flatter organizations mean that lower-level employees may be able to use technology to reach deep into corporate assets. Compromising computing assets for use in other crimes. While some steal cash for their own use, others resell their hacking to others. Data harvesters cybercriminals who infiltrate systems and collect data for illegal resale. Cash-out fraudsters criminals who might purchase data from the harvesters in order to buy (then resell) goods using stolen credit cards or create dales accounts via identify theft. Hackers might also infiltrate computer systems to enlist hardware for subsequent illegal acts. Botnets hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks. This includes sending spam from thousands of difficult-to-shut-down accounts.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents