Black hat break into other peoples computer systems

This preview shows page 3 - 5 out of 11 pages.

black hat – break into other people’s computer systems and may just look around or may steal and destroy information white hat – work at the request of the system owners to find system vulnerabilities and plug the holes o Virus – software written with malicious intent to cause annoyance or damage. Must attach to something to spread o adware – software that, while purporting to serve some useful function and often fulfilling that function, also allows internet advertisers to display advertisements without the consent of the computer user o spyware – a special class of adware that collects data about the user and transmits it over the internet without the user’s knowledge or permission o DoS – denial-of-service attach. Floods a website with so many requests for service that it slows down or crashes the site o DDoS – distributed denial-of-service attack – attacks from multiple computers that flood a website with so many requests for service that it slows down or crashes o Trojan horse – hides inside other software, usually as an attachment or a downloadable file o Worm – spreads itself, not only from file to file, but also from computer to computer. No need to attach to something to spread o elevation of privilege – a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system o packet tampering – consists of altering the contents of packets as they travel over the internet or altering data on computer disks after penetrating a network o sniffer – a program or device that can monitor data traveling over a network
Image of page 3

Subscribe to view the full document.

o spoofing – the forging of the return address on an email so that the message appears to come from someone other than the actual sender The first line of defense – people Definitions of o Insiders – legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident o social engineering – hackers use their social skills to trick people into revealing access credentials or other valuable information o dumpster diving – looking through people’s trash to obtain information The second line of defense - technology Definitions of o Identity theft – the forging of someone’s identity for the purpose of fraud. Phishing/pharming phishing – a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses o authentication – a method for confirming users’ identities o authorization – the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space Authentication methods including definitions o Something the user knows, such as a user ID and password o Something the user has, such as a smart card or token Tokens – small electronic devices that change user passwords automatically
Image of page 4
Image of page 5

{[ snackBarMessage ]}

Get FREE access by uploading your study materials

Upload your study materials now and get free access to over 25 million documents.

Upload now for FREE access Or pay now for instant access
Christopher Reinemann
"Before using Course Hero my grade was at 78%. By the end of the semester my grade was at 90%. I could not have done it without all the class material I found."
— Christopher R., University of Rhode Island '15, Course Hero Intern

Ask a question for free

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern