Professional Documents
Culture Documents
Cyber Attacks PDF 1640877857
Cyber Attacks PDF 1640877857
Cyber Attacks PDF 1640877857
Spyware
Spyware
Malware
Worms
Malware Adware
Botnets Bots
Phishing
Rootkits
Botnet
Technology
Viruses
Keystroke
ZeuS Exploit tools and kits Logger
Monitor
Email harvesters
Technology Using localized networks
Bluetooth-enabled devices planted at gas pumps to
read credit card details
Wi-fi Tools Using Mobile tech
Loaded externally
War-driving
Hacking
Eavesdropping
Picture attachments
Stealing devices
Physical acquisition
Software updates
Acquiring improperly disposed-of device
USB/external devices
Pharming Phishing
Methods
Computers
Employees
P2P services Mass rebellion
Contractors/Consultants
Disgruntled employees
Peer-to-Peer networks
Unintentional disclosure
Cyber Identity Theft (Laura)
Posing as authority, mass-emailing victims of past
identity theft Scam within a scam Planting a Mole
Cyber Attacks Internal
Spoofing Disgruntled Employee
Posing
Sabotage
Registering another person for a dating site, for Activists
example Pranking
External Terrorist Groups
War-dialing
State Actors
Eavesdropping
Methods
Send Message
Password-based attacks Hacking Website Defacement
Methods
Publicity
Sniffers
Deter Communication
Bluebugging and bluesnarfing
Denial of Service
Suspend System Activity (permanently or
Smishing Phishing temporarily)
Mobile devices
Bribery Disclosure by employees Data Mining
Internet
More attacks on social networking sites Predictions (2011) Brute Force Attacks
URL manipulation
Eavesdropping
Wireless Interference
Packet Sniffing