Kenneth C. Laudon,Jane P. Laudon Management Information System 12th Edition pdf



Download 15,21 Mb.
Pdf ko'rish
bet265/645
Sana20.01.2022
Hajmi15,21 Mb.
#393158
1   ...   261   262   263   264   265   266   267   268   ...   645
Bog'liq
Kenneth C. Laudon ( PDFDrive ) (1)

Keyloggers

record every keystroke made on a computer to

steal serial numbers for software, to launch Internet attacks, to gain access to 

e-mail accounts, to obtain passwords to protected computer systems, or to pick

up personal information such as credit card numbers. Other spyware programs

reset Web browser home pages, redirect search requests, or slow performance

by taking up too much memory. The Zeus Trojan described in the chapter-

opening case uses keylogging to steal financial information.

HACKERS AND COMPUTER CRIME



hacker

is an individual who intends to gain unauthorized access to a com-

puter system. Within the hacking community, the term 



cracker

is typically used

to denote a hacker with criminal intent, although in the public press, the terms

hacker and cracker are used interchangeably. Hackers and crackers gain unau-

thorized access by finding weaknesses in the security protections employed by

Web sites and computer systems, often taking advantage of various features of

the Internet that make it an open system that is easy to use. 

Hacker activities have broadened beyond mere system intrusion to include

theft of goods and information, as well as system damage and 

cybervandalism

,

the intentional disruption, defacement, or even destruction of a Web site or



corporate information system. For example, cybervandals have turned many of

the MySpace “group” sites, which are dedicated to interests such as home beer




Chapter 8

Securing Information Systems 

299

brewing or animal welfare, into cyber-graffiti walls, filled with offensive



comments and photographs.

S p o o f i n g   a n d   S n i f f i n g  

Hackers attempting to hide their true identities often spoof, or misrepresent,

themselves by using fake e-mail addresses or masquerading as someone else.



Spoofing

also may involve redirecting a Web link to an address different from the

intended one, with the site masquerading as the intended destination. For exam-

ple, if hackers redirect customers to a fake Web site that looks almost exactly like

the true site, they can then collect and process orders, effectively stealing

business as well as sensitive customer information from the true site. We provide

more detail on other forms of spoofing in our discussion of computer crime.



sniffer

is a type of eavesdropping program that monitors information

traveling over a network. When used legitimately, sniffers help identify

potential network trouble spots or criminal activity on networks, but when

used for criminal purposes, they can be damaging and very difficult to

detect. Sniffers enable hackers to steal proprietary information from

anywhere on a network, including e-mail messages, company files, and

confidential reports.

D e n i a l - o f - S e r v i c e   A t t a c k s

In a 


Download 15,21 Mb.

Do'stlaringiz bilan baham:
1   ...   261   262   263   264   265   266   267   268   ...   645




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2025
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish