OMIS2000- Chapter Notes

1 e commerce and the internet e commerce today refers

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: pes of spyware also act as malicious software, they install themselves on a computer to monitor user web surfing activity and serve up advertising. • Keyloggers o Record every keystroke made on a computer to steal serial numbers for software, to launch internet attacks, to gain access to email accounts, to obtain passwords to protected computer systems, or to pick up personal information such as credit card numbers o Other spyware programs reset web browser home pages; redirect search requests, or slow performance by taking up too much memory. o Zeus Trojan (Keylogging example) Hackers and Computer Crime • Hacker – is an individual who intends to gain unauthorized access to a computer system. OMIS 2000 Final Exam Gahtan 27 Cracker – used to denote a hacker with criminal intent although in the public press, the terms are used interchangeably • Hackers and crackers gain unauthorized access by finding weaknesses in the security protections employed by Web sites and computer systems, often taking advantage of various features of the internet that make it an open system that is easy to use. • Hacker activities include: theft of goods and info, as well as system damage and cybervandalism, the intentional disruption, defacement, or even destruction of a web site or corporate info system • Example: cybervandals have turned many of the MySpace group sites which are dedicated to interests into cyber- graffiti walls, filled with offensive comments and photographs Spoofing and sniffling • Spoofing – hackers attempting to hide their true identities often spoof, or misrepresent themselves by using fake email addresses or masquerading as someone else. o Example: redirecting a web link to an address other than the one intended, as the fake address pretending to be the one intended to go to. If hackers redirect customers to a fake website they can collect and...
View Full Document

This note was uploaded on 03/28/2014 for the course OMIS 2000 taught by Professor Hk during the Fall '13 term at York University.

Ask a homework question - tutors are online