BU415 Chapter Notes - Chapter 14: Botnet, Ticket Resale, Denial-Of-Service Attack
Document Summary
Security of information systems must be an organization"s top priority. The vast majority of security breaches can be prevented. Different vendors, each with their own potential weaknesses, provide technology components that may be comprised by misuse, misconfiguration, or mismanagement. Flatter organizations mean that lower-level employees may be able to use technology to reach deep into corporate assets. Compromising computing assets for use in other crimes. While some steal cash for their own use, others resell their hacking to others. Data harvesters cybercriminals who infiltrate systems and collect data for illegal resale. Cash-out fraudsters criminals who might purchase data from the harvesters in order to buy (then resell) goods using stolen credit cards or create dales accounts via identify theft. Hackers might also infiltrate computer systems to enlist hardware for subsequent illegal acts. Botnets hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks. This includes sending spam from thousands of difficult-to-shut-down accounts.