Flashcards in Chapter 17: Information Security Deck (11)
What are data harvesters and cash-out fraudsters?
Data harvesters: Cybercriminals who infiltrate systems and collect data for illegal resale
Cash-out fraudsters: Purchase data from the harvesters and use stolen credit card data for illegal accounts
What are botnets of zombie computers?
Networks of infiltrated and compromised machines controlled by a central command
What are distributed denial of service? (DDoS)
Sending spam from thousands of difficult to shut down accounts, launching click fraud efforts
What is social engineering?
Tricking employees into revealing information by impersonating someone else
What is phishing?
Acquiring sensitive information or tricking someone into installing malicious software
What is a spoofed email?
Email that has been altered to seem as if it came form another source
What are zero-day exploits?
Attacks that are so new they have not been clearly defined
What is malware?
Seeks to compromise a computing system without permission
What are viruses, worms and trojans?
Viruses: Programs that infect other software or files
Worms: Programs that take advantage of security vulnerability
Trojans: Exploits that sneak in by masquerading as something they are not
What are honeypots?
Bogus targets meant to draw out hacking attempts