Midterm 1 chpt 4 BUS 391
DDoS attack
- distributed denial of service --> take place when hackers gain unauthorized access and control to a network of computers connected to the internet -hacker is able to control each device via remote access -interrupt and stops network traffic by flooding it with too many requests
randsomeware attack
-computer data inaccessible until a ransom is paid -payments are difficult to trace -perpetrator may or may not send a code that allows the victim to open the data files
cybercrime
-crimes involving computers -attacks can originate either inside or outside the firm -companies must protect their systems and data
spear phishing attack
-email scam that is directed toward a specific person or org -steal data and or install malicious software on a device
White hat hackers
-good guys -ethical hackers who execute a variety of tasks designed to test the security of an organization -expose weakness before it happens
Firewalls
-hardware and/or software used to keep a computer secure from outside threats
behavioral science
-how to get ahead -cant just use firewalls, but they use behavior science to observe and record the conduct of computer users to flag behavior that deviates from normal behavior
Phishing attack
-illegitimate fake email message from "real" companies -get user to provide private information
social engineering
-imposter poses as an organizations IT person -manipulate people to give us personal or confidential information
cyberattacks
-intentional misuse of IT on networks using the internet 1. Disables computers or prevents data access 2. gains access to data on device
types of cyber attacks
-pharming and phishing -spamming and spoofing -trojans and viruses -identity theft -DoS and DDoS attacks
trojan attack
-programs that appears legitimate but executes malicious code when activated -trick users
packet sniffers
-specialized hardware or software that captures packets transmitted over a network -used to steal information
keystroke logger
-type of spyware that records all actions types on a keyboard -record passwords or confidential information