Cyber Attacks PDF 1640877857

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Trojans

Spyware
Spyware
Malware
Worms
Malware Adware
Botnets Bots
Phishing
Rootkits
Botnet
Technology
Viruses
Keystroke
ZeuS Exploit tools and kits Logger
Monitor
Email harvesters
Technology Using localized networks
Bluetooth-enabled devices planted at gas pumps to
read credit card details
Wi-fi Tools Using Mobile tech

Data breaches at large companies (TJ Maxx,


Using tablets
Heartland, ...)
Precedents
Updates
Pharmamed.php (email harvesting)

Software Customized Scripts


Bluesnarfing, bluebugging, HeloMoto

Loaded externally
War-driving

Hacking
Eavesdropping

Espionage (Leslie) Trojans


Password-based attacks
Hacking
PDF attachments
Compromised-key attacks

Meeting Requests with Attachments


Man-in-the-middle attacks

Email DOC attachments


Sniffers

Picture attachments
Stealing devices
Physical acquisition
Software updates
Acquiring improperly disposed-of device

USB/external devices
Pharming Phishing
Methods
Computers
Employees
P2P services Mass rebellion

Contractors/Consultants
Disgruntled employees

Outsiders with Access


Bribery Disclosure by employees

Peer-to-Peer networks
Unintentional disclosure
Cyber Identity Theft (Laura)
Posing as authority, mass-emailing victims of past
identity theft Scam within a scam Planting a Mole
Cyber Attacks Internal
Spoofing Disgruntled Employee
Posing
Sabotage
Registering another person for a dating site, for Activists
example Pranking
External Terrorist Groups
War-dialing
State Actors
Eavesdropping
Methods
Send Message
Password-based attacks Hacking Website Defacement
Methods
Publicity
Sniffers
Deter Communication
Bluebugging and bluesnarfing
Denial of Service
Suspend System Activity (permanently or
Smishing Phishing temporarily)

Disgruntled employees Exploiting Defaults Faulty IIS (Internet Information Service)

Mobile devices
Bribery Disclosure by employees Data Mining
Internet

Unintentional disclosure Authorization Bypass

Stealing devices Cyber Terrorism (Joe) Trojan Horse


Physical acquisition
Acquiring improperly disposed-of device Software Virus

Looking over the user's shoulder Worm


Direct observation
Camera/video capabilities on devices Wired Hardware

ATM skimming Dictionary Attacks

Exploitation of mobile GPS location information Stealing Password Hybrid Attacks

More attacks on social networking sites Predictions (2011) Brute Force Attacks

Increase in "mixed threats" (email, Web, social media) Technology Phishing

Email Man-in-the-Middle DNS hijacking

URL manipulation

Eavesdropping

Wireless Interference

Packet Sniffing

You might also like