This topic contains a solution. Click here to go to the answer

Author Question: Explain how hackers use information stolen from data breaches for credit card forgery. What will ... (Read 75 times)

anjilletteb

  • Hero Member
  • *****
  • Posts: 569
Explain how hackers use information stolen from data breaches for credit card forgery.
 
  What will be an ideal response?

Question 2

What are patches and service packs?
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

memslove

  • Sr. Member
  • ****
  • Posts: 321
Answer to Question 1

Over 67 percent of data breaches come from hackers trying to make money. Hackers
are primarily looking for personally identifiable information (PII), or data that can be used to
identify a person. This includes names, addresses, dates of birth, social security numbers, credit
card numbers, health records, bank account numbers, personal identification numbers, and email
addresses. Stolen information is commonly used for credit card fraud. Stolen credit card
information is validated through a process called carding, where a small charge is placed on the
card to ensure it is working. Valid cards are then bundled and sold on the black market. The price
of stolen credit cards can run from 2 to 45 per card, depending on the type of account. Stolen
data is commonly used for identity theft, extortion, and industrial espionage.

Answer to Question 2

Patches are group fixes for high priority failures that can be applied to all copies of a
given product. Software vendors supply patches to fix security and other critical problems. They
usually bundle fixes of low-priority problems into larger groups called service packs. Users
apply service packs in much the same way that they apply patches, except that service packs
typically involve fixes to hundreds or thousands of problems.




anjilletteb

  • Member
  • Posts: 569
Reply 2 on: Jul 7, 2018
:D TYSM


LVPMS

  • Member
  • Posts: 323
Reply 3 on: Yesterday
YES! Correct, THANKS for helping me on my review

 

Did you know?

The horizontal fraction bar was introduced by the Arabs.

Did you know?

In the United States, there is a birth every 8 seconds, according to the U.S. Census Bureau's Population Clock.

Did you know?

If you could remove all of your skin, it would weigh up to 5 pounds.

Did you know?

Addicts to opiates often avoid treatment because they are afraid of withdrawal. Though unpleasant, with proper management, withdrawal is rarely fatal and passes relatively quickly.

Did you know?

Signs and symptoms that may signify an eye tumor include general blurred vision, bulging eye(s), double vision, a sensation of a foreign body in the eye(s), iris defects, limited ability to move the eyelid(s), limited ability to move the eye(s), pain or discomfort in or around the eyes or eyelids, red or pink eyes, white or cloud spots on the eye(s), colored spots on the eyelid(s), swelling around the eyes, swollen eyelid(s), and general vision loss.

For a complete list of videos, visit our video library