Black hat hacker use knowledge to destroy information

This preview shows page 47 - 49 out of 52 pages.

Black-hat hacker: use knowledge to destroy information or for illegal gainoScript kiddies: use tools created by skilled hackers to wreakthe same havoc as professional hackersCredit card information can reside on your hard drive, hacker canaccess information online by using a packet snifer or a keylogger(program that captures all keystrokes made on a computer)Packet: small pieces of data that travel together the Internet – identifed with an IP addressPacket snifer: computer program deployed by hackers that looksat each packet as it travelsoSome capture all packets, others just some with particular info (cc #s)oWireless networks vulnerable oInstall a frewall and use data encryption to protect yourselfWith cc # hacker can purchase items or sell # to someone who will Identity theft: someone using personal information about you to assume your identity for the purpose of defrauding others Trojan horse: program that appears to be something useful or desirable (ex: game) but while it runs does something malicious in the background oOften installs backdoor program: allows hackers to take almost total control of your computer without your knowledge – computer is referred to as a zombieDenial-of-service (DoS) attack: legit user is denied access to a computer system because hacker is repeatedly making requests of that computer system through a zombie Distributed denial-of-service attack: launches DoS attacks from more than one zombie at a time (so you can’t trace it)Botnet: large group of software programs that runs autonomously on zombie computers DDoS attacks can be fnancially distressing for owners of web sites Downloaded by Nida Mahmood ([email protected])lOMoARcPSD|4218638
How hackers gain access: direct or indirectoDirect: sitting down at a computer and installing hacking softwareoIndirect: through internet connection Logical ports: virtual communications gateways or paths that allow a computer to organize requests for information from other networks or computersoOpen logical ports invite intruders oTake precautions to restrict access to your logical port RESTRICTING ACCESS TO YOUR DIGITAL ASSETS Firewall: program or hardware device designed to protect computers from hackers – personal frewall (home network) oClose open logical ports Types of frewalls: oFor maximum protection use software and hardware frewall oMany security suites (Norton internet security, McAfee Internet security) also include frewall softwareoIf you are using a security suite, you should disable the frewall that came with your OSoHardware frewall devices – many routers include frewall protection (good for novices)Websites exist to test your computer’s vulnerability Bluetooth vulnerability (2):oBluesnarfng: exploiting a faw in the Bluetooth access software for the purpose of accessing a bluetooth device and stealing the information contained on it oBluebugging (more difcult, more dangerous): hacker takescontrol of a Bluetooth-enabled device. Can make phone

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture