Midterm 1 chpt 4 BUS 391

Ace your homework & exams now with Quizwiz!

DDoS attack

- distributed denial of service --> take place when hackers gain unauthorized access and control to a network of computers connected to the internet -hacker is able to control each device via remote access -interrupt and stops network traffic by flooding it with too many requests

randsomeware attack

-computer data inaccessible until a ransom is paid -payments are difficult to trace -perpetrator may or may not send a code that allows the victim to open the data files

cybercrime

-crimes involving computers -attacks can originate either inside or outside the firm -companies must protect their systems and data

spear phishing attack

-email scam that is directed toward a specific person or org -steal data and or install malicious software on a device

White hat hackers

-good guys -ethical hackers who execute a variety of tasks designed to test the security of an organization -expose weakness before it happens

Firewalls

-hardware and/or software used to keep a computer secure from outside threats

behavioral science

-how to get ahead -cant just use firewalls, but they use behavior science to observe and record the conduct of computer users to flag behavior that deviates from normal behavior

Phishing attack

-illegitimate fake email message from "real" companies -get user to provide private information

social engineering

-imposter poses as an organizations IT person -manipulate people to give us personal or confidential information

cyberattacks

-intentional misuse of IT on networks using the internet 1. Disables computers or prevents data access 2. gains access to data on device

types of cyber attacks

-pharming and phishing -spamming and spoofing -trojans and viruses -identity theft -DoS and DDoS attacks

trojan attack

-programs that appears legitimate but executes malicious code when activated -trick users

packet sniffers

-specialized hardware or software that captures packets transmitted over a network -used to steal information

keystroke logger

-type of spyware that records all actions types on a keyboard -record passwords or confidential information


Related study sets

Living Environment Regents questions

View Set

CompTIA Security+ SY0-601 (Section 5.0 Governance, Risk and Compliance)

View Set

HW7- Chapter 10 Basic Economic Relationships

View Set

10 Basic Router Configuration - Module Quiz

View Set

Digital Marketing - Stukent mimic

View Set

ECON 2201 CH. 11 & 12 Quizzes for Final Exam

View Set

FINN 3120- Ch. 6 Interest Rates and Bonds

View Set