OMIS2000- Chapter Notes

G ebayca e commerce business models portal provides

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ombie, serving a master computer belonging to someone else. • OMIS 2000 Final Exam Gahtan 28 o Once a hacker infects enough computers, he or she can use the amassed resources of the botnet to launch DDoS attacks, phishing campaigns, or unsolicited ‘spam’ email. Computer crime • Vulnerabilities of systems are targets for computer crime • Defined as “any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution” • Table 8- 2 Computers as targets of crime • Example of Computer crime o Identity theft – an imposter obtains key pieces of personal info, such as social insurance number, driver’s license, or credit card numbers to impersonate someone else. o Phishing- form of spoofing, involves setting up fake web sites or sending email or text messages that look like those of legitimate businesses to ask users for confidential personal data. The message instructs recipients to update or confirm records by providing social insurance, bank and credit card info, and other confidential data either by responding to an email, by entering data at a bogus web site or by calling a telephone number Two phishing techniques that are harder to detect • Evil twins – are wireless networks that pretend to offer trustworthy Wi- Fi connections to the Internet, such as those in airport lounges, hotels or coffee shops. o The bogus network looks legitimate; try to capture passwords or credit card numbers of users who log onto the network. • Pharming o Redirects users to a bogus web page, even when the...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online