Chapter 11 Flashcards
FBI Wanted List for cyber Criminals
- had over 100 people on it
- each responsible for consumer loss ranging from $35000 to 100 million
Computer security is concerned with:
- risk management
- privacy (want to make sure all data is kept private)
- Integrity
- availability
of e information
Risk management
recognition, consequences, and assessment of risk to a computers assets
What percentage of employees steal data?
57%
How often does identity theft happen?
every 2 seconds
whats a hacker
someone who attempts to invade or disable a computer’s security measures and then to steal the computer resources at their leisure
unsecured computer
extremely easy to breach, especially by a seasoned hacker. Many times these computers are connected to the Internet, so they receive emails with malicious attachments like viruses, worms, and malware.
What is the average time to identify a computer breach?
207 days for a company to identify
how many reports of identity theft did FTC receive
11 million
What percentage of Americans have never checked to see if their data was breached?
64%
What percentage of funds that are stolen are not recoverable?
68%
Most common type of threats
-most common is use of stolen cards then followed by ransomware and phishing
- average smart home could be at risk of more than 12,000 hacker attacks in 1 week
- 43% of all breaches are insider threats either intentional or unintentional
- over 24 billion passwords were exposed by hackers in 2022 and 64% pf passwords only contain 8-11 letters
Hacker facts
- only need internet and a computer
- events held called hackathons
- not all hackers are paid
- look to steal information
3 things hackers look for
- information
- places to store information other than their own computer
- processing power
types of hackers
- white hat hackers
- black hat hackers
- script kitties
- Cracker
- hactivist
- cyberterrorist