CP102 Lecture Notes - Lecture 9: Master Boot Record, Boot Sector, Grey Hat
Document Summary
Identity theft occurs when a thief steals personal information. Packet analyzer is a program deployed by hackers that looks at each packet it travels on the internet. Trojan horse is a program that appears to be something useful or desirable but does something malicious in the background without your knowledge. Backdoor programs and rootkits are programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. Zombie is used to launch denial of service attacks on other computers. Denial of service attacks are legitimate users denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer where they have been taken over as a zombie. Distributed denial of service attack launches denial of service attacks from more than one zombie at the same time. Botnet is a large group of software programs that run autonomously on zombie computers.