CP102 Chapter Notes - Chapter 9: Web Server, Trojan Horse, Floppy Disk

75 views7 pages
15 Dec 2016
School
Course
Professor

Document Summary

Any criminal action perpetrated through the use of a computer. Anyone who breaks into a computer system unlawfully. White-hat hackers/ethical hackers hackers who break in just for the challenge and. Claim they are helping society by helping companies realize the vulnerabilities that exist in their systems. Black-hat hackers hackers who break in to destroy information or for illegal gain. Grey-hat hackers a cross between black and white-hat hackers. Illegally break into systems to flaunt their expertise to the administrator; attempt to sell their services in repairing security breaches. When sensitive or confidential information is copied, transmitted, or viewed by an individual who isn"t authorized to handle the data. Looks at each packet as it travels on the internet. Hacker can capture bank information from your hard drive using one of these. Software programs that run on servers and search for vulnerability of computers that visit the server. Hackers must be able to control many computer at a time.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents