MIS 311 Chapter Notes - Chapter 17: Adware, Wi-Fi, Dumpster Diving

71 views3 pages

Document Summary

Before we begin, here is a link for a quick study break. It represents my performance when i took this course: https://www. youtube. com/watch?v=bnj8upvdtqy. Malware was snuck into a partner of target, where credit card transactions were recorded. The alert system was ignored and employees did not allow the system to automatically remove malware. Security is a must for any firm. Software and hardware solutions grow more complex. Intellectual property theft: cyberwarfare, terrorism, prank, protest hacking: hacktivism, revenge (disgruntled employees) Data harvester: hackers who infiltrate systems and collect data. Cash out fraudster: criminals who purchase data from harvesters in order to buy/resell goods using stolen credit cards and false accounts. ***clearly know the relationship between data harvester and cash out fraudster*** Botnet: zombie computers used to send spam. leads to : ddos (distribute denial of service): shut websites down by overloading them with requests. Hacktivist: protester seeking to make political point by leveraging tech for infiltration.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents