dss ch 4 pt 3

Black-hat hackers (bad guys)

break into other people's computer systems and may just look around or may steal and/or destroy information

Hacktivists

have philosophical and political reasons for breaking into systems and will often deface a Web site as a protest

Spyware

a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
collect specific data about the user, ranging from general demographics such as name, address, and browsing habits t

backdoor programs

open a way into the network for future attacks

Adware is

software that, although purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

Cracker

a hacker with criminal intent

Virus

software written with malicious intent to cause annoyance or damage.

White-hat hackers (good guys hired as security consultants)

work at the request of the system owners to find system vulnerabilities and plug the holes

Cyberterrorists

seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction

Forms of social engineering

Dumpster diving and Pretexting

social engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information.

Pretexting

a form of social engineering in which one individual lies to obtain confidential data about another individual.

issue of downtime

costs of downtime are not only associated with lost revenues but also with financial performance, damage to reputations, and even travel or legal expenses
cause a major drain on an organization

web log

consists of one line of info for every visitor to a website and is usually stored on a web server

key logger or key trapper, software

a program that records every keystroke and mouse click

clickstream

records info about a customer during a web surfing session such as what websites were visited, how long visit was, what ads viewed, and what was purchased

cookie

small file deposited on hard drive by website containing info about customers and their web activities

hardware key logger

hardware device that captures keystrokes on their journey from keyboard to motherboard

A user can opt in to receive emails by

choosing to allow permissions to incoming emails.

A user can opt out of receiving emails by

choosing to deny permission to incoming emails.

Cookie

A small file deposited on a hard drive by a Web site containing information about customers and their Web activities.
allow Web sites to record the comings and goings of customers, usually without their knowledge or consent

Cyberbullying

includes threats, negative remarks, or defamatory comments transmitted through the Internet or posted on the website