ITM 100 Lecture Notes - Lecture 10: Arp Spoofing, Packet Analyzer, Buffer Overflow
sg418230 and 39832 others unlocked
14
ITM 100 Full Course Notes
Verified Note
14 documents
Document Summary
Ex. gonzalez:american computer hacker and computer criminal who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and atm numbers from 2005 to 2007: the biggest such fraud in history. Gonzalez and his accomplices used sql injection to deploy backdoors on several corporate systems in order to launch packet sniffing (specifically, arp spoofing) Information systems are mission critical for many organizations: failed computer systems can lead to significant or total loss of business function. Information and systems are very vulnerable: confidential personal and financial data, trade secrets, new products, strategies. Without proper security measures, these systems would be next to impossible to use and benefit from. A security breach may cut into a firm"s market value almost immediately. Inadequate security also brings forth issues of liability. Hardware problems breakdowns,configuration errors, damage from improper use or crime. Physical damage to infrastructure use of networks/computers outside of firms control ex. code spaces.