This topic contains a solution. Click here to go to the answer

Author Question: Explain how hackers use information stolen from data breaches for credit card forgery. What will ... (Read 83 times)

anjilletteb

  • Hero Member
  • *****
  • Posts: 569
Explain how hackers use information stolen from data breaches for credit card forgery.
 
  What will be an ideal response?

Question 2

What are patches and service packs?
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

memslove

  • Sr. Member
  • ****
  • Posts: 321
Answer to Question 1

Over 67 percent of data breaches come from hackers trying to make money. Hackers
are primarily looking for personally identifiable information (PII), or data that can be used to
identify a person. This includes names, addresses, dates of birth, social security numbers, credit
card numbers, health records, bank account numbers, personal identification numbers, and email
addresses. Stolen information is commonly used for credit card fraud. Stolen credit card
information is validated through a process called carding, where a small charge is placed on the
card to ensure it is working. Valid cards are then bundled and sold on the black market. The price
of stolen credit cards can run from 2 to 45 per card, depending on the type of account. Stolen
data is commonly used for identity theft, extortion, and industrial espionage.

Answer to Question 2

Patches are group fixes for high priority failures that can be applied to all copies of a
given product. Software vendors supply patches to fix security and other critical problems. They
usually bundle fixes of low-priority problems into larger groups called service packs. Users
apply service packs in much the same way that they apply patches, except that service packs
typically involve fixes to hundreds or thousands of problems.




anjilletteb

  • Member
  • Posts: 569
Reply 2 on: Jul 7, 2018
Wow, this really help


duy1981999

  • Member
  • Posts: 341
Reply 3 on: Yesterday
Thanks for the timely response, appreciate it

 

Did you know?

When blood is deoxygenated and flowing back to the heart through the veins, it is dark reddish-blue in color. Blood in the arteries that is oxygenated and flowing out to the body is bright red. Whereas arterial blood comes out in spurts, venous blood flows.

Did you know?

The word drug comes from the Dutch word droog (meaning "dry"). For centuries, most drugs came from dried plants, hence the name.

Did you know?

Many medications that are used to treat infertility are injected subcutaneously. This is easy to do using the anterior abdomen as the site of injection but avoiding the area directly around the belly button.

Did you know?

Fungal nail infections account for up to 30% of all skin infections. They affect 5% of the general population—mostly people over the age of 70.

Did you know?

Drug abusers experience the following scenario: The pleasure given by their drug (or drugs) of choice is so strong that it is difficult to eradicate even after years of staying away from the substances involved. Certain triggers may cause a drug abuser to relapse. Research shows that long-term drug abuse results in significant changes in brain function that persist long after an individual stops using drugs. It is most important to realize that the same is true of not just illegal substances but alcohol and tobacco as well.

For a complete list of videos, visit our video library