CP102 Chapter Notes - Chapter 9: Web Server, Trojan Horse, Floppy Disk
Document Summary
Any criminal action perpetrated through the use of a computer. Anyone who breaks into a computer system unlawfully. White-hat hackers/ethical hackers hackers who break in just for the challenge and. Claim they are helping society by helping companies realize the vulnerabilities that exist in their systems. Black-hat hackers hackers who break in to destroy information or for illegal gain. Grey-hat hackers a cross between black and white-hat hackers. Illegally break into systems to flaunt their expertise to the administrator; attempt to sell their services in repairing security breaches. When sensitive or confidential information is copied, transmitted, or viewed by an individual who isn"t authorized to handle the data. Looks at each packet as it travels on the internet. Hacker can capture bank information from your hard drive using one of these. Software programs that run on servers and search for vulnerability of computers that visit the server. Hackers must be able to control many computer at a time.