Black-hat hackers (bad guys)
break into other people's computer systems and may just look around or may steal and/or destroy information
Hacktivists
have philosophical and political reasons for breaking into systems and will often deface a Web site as a protest
Spyware
a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
collect specific data about the user, ranging from general demographics such as name, address, and browsing habits t
backdoor programs
open a way into the network for future attacks
Adware is
software that, although purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
Cracker
a hacker with criminal intent
Virus
software written with malicious intent to cause annoyance or damage.
White-hat hackers (good guys hired as security consultants)
work at the request of the system owners to find system vulnerabilities and plug the holes
Cyberterrorists
seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction
Forms of social engineering
Dumpster diving and Pretexting
social engineering
hackers use their social skills to trick people into revealing access credentials or other valuable information.
Pretexting
a form of social engineering in which one individual lies to obtain confidential data about another individual.
issue of downtime
costs of downtime are not only associated with lost revenues but also with financial performance, damage to reputations, and even travel or legal expenses
cause a major drain on an organization
web log
consists of one line of info for every visitor to a website and is usually stored on a web server
key logger or key trapper, software
a program that records every keystroke and mouse click
clickstream
records info about a customer during a web surfing session such as what websites were visited, how long visit was, what ads viewed, and what was purchased
cookie
small file deposited on hard drive by website containing info about customers and their web activities
hardware key logger
hardware device that captures keystrokes on their journey from keyboard to motherboard
A user can opt in to receive emails by
choosing to allow permissions to incoming emails.
A user can opt out of receiving emails by
choosing to deny permission to incoming emails.
Cookie
A small file deposited on a hard drive by a Web site containing information about customers and their Web activities.
allow Web sites to record the comings and goings of customers, usually without their knowledge or consent
Cyberbullying
includes threats, negative remarks, or defamatory comments transmitted through the Internet or posted on the website