ITM 100 Lecture Notes - Lecture 10: Arp Spoofing, Packet Analyzer, Buffer Overflow

51 views8 pages
sg418230 and 39832 others unlocked
ITM 100 Full Course Notes
14
ITM 100 Full Course Notes
Verified Note
14 documents

Document Summary

Ex. gonzalez:american computer hacker and computer criminal who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and atm numbers from 2005 to 2007: the biggest such fraud in history. Gonzalez and his accomplices used sql injection to deploy backdoors on several corporate systems in order to launch packet sniffing (specifically, arp spoofing) Information systems are mission critical for many organizations: failed computer systems can lead to significant or total loss of business function. Information and systems are very vulnerable: confidential personal and financial data, trade secrets, new products, strategies. Without proper security measures, these systems would be next to impossible to use and benefit from. A security breach may cut into a firm"s market value almost immediately. Inadequate security also brings forth issues of liability. Hardware problems breakdowns,configuration errors, damage from improper use or crime. Physical damage to infrastructure use of networks/computers outside of firms control ex. code spaces.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents