MIS 301 Chapter Notes - Chapter 15: Hacktivism, Botnet, Dumpster Diving

16 views3 pages

Document Summary

Firms experiencing a security breach can experience financial loss, court costs, plummeting stock prices, etc. Illegal funds transfer: account theft, stealing personal or financial data, compromising computing assets for use in other crimes, spying, cyber war, terrorism, pranks, protests or hacktivism, revenge. Employees who are upset with bosses, etc. Cyber-crime underworld: data harvesters: get the data by hacking, sell their info to cash-out fraudsters. Cash-out fraudsters: criminals who purchase data from harvesters to buy/resell goods using stolen credit. Might also create false accounts via identity theft. Botnets: zombie computers: networks of infiltrated machines controlled by a central command, used for nefarious activity i. e. spending spam to thousands of accounts, etc. Good vs. bad: white hat hackers: good guys. Share their discoveries so that someone can solve the problem and improve security: black hat hackers: bad guys. Employees who want revenge and have access to data can steal info and sell it illegally.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents