Discussion Vsr Flashcards
is a significant motive for hackers, malware writers, and freudsters
Financial incentive
ALSO KNOWN AS SKIDIOTS, SKIDDIES OR VICTOR SKILL DEFICIENCY (VSD)
-SCRIPT KIDDIES
is a Remote Administration Tool (RAT) that allows hackers to gain unauthorized remote access and control over a compromised computer system, operating covertly without the owner’s awareness. It enables attackers to execute commands, exfiltrato data, manipulate system settings, and deploy additional malware while maintaining persistent access.
Deep Throat
consist of individuals using the Internet to communicate and facilitate cybercrime
Cybercriminal organizations
-Sophisticated computer criminals categorized as hackers or crackers based on motivation
CYBERPUNKS
- exploit system vulnerabilities without economic motivation
Hackers
employ knowledge for personal gain
-Crackers
-Term “crackers” derived from combination of ____
criminal hackers
distinguished by economic motivation (Britz, 2013)
-Hackers and crackers
target valuable data like trade secrets or credit card Information
Hackers or crackers
possess skills akin to black-hats but choose lawful paths
White-hats
- Often collaborate with authorities and companies to combat cybercrime
White-hats
- Historically, they refrain from illegal attacks on information systems (Bernik, 2014)
White-hats
engage in illegal acts to harm information systems and steal information
- Their main purpose is to commit malicious activities (Benik, 2014)
Black hats
hackers fall between black and white-hat hackers
- Ethics may shift depending on the situation (Bernik, 2014)
Gray-hat
accounted for the majority of compromised records in 2011
Hacktivists
coined by the Cult of the Dead Cow hacker collective in the 19905
“hacktivism”
-Used to describe technological social movements in contemporary language
-Sourced from Verizon’s 2012 Deta Breach investigations Report (Britz, 2013)
Hacktivists
An attacker may commit a criminal offense against a company after a perceived injustice against themselves.
REVENGE
commonly motivates criminals, both internal and external to the company.
GREED
It entices them to enrich their lives at others’ expense, disregarding the damage caused
GREED
is not listed as one of the seven deadly sins by accident
- Greed
-Investigators may swiftly uncover this motivator, prioritizing locating proceeds of the crime to mitigate potential damage
- Greed
rely heavily on technology and education provided by experienced cybercriminals (Graeme, 2020)
Script kiddies
Some cyber criminals use technical attacks as training exercises to develop skills for more lucrative. attacks
-These attacks also advertise their skill set and successful compromises to build credibility on cybercriminal websites
TEST OF SKILL
In the fiercely competitive business world, companies seek to gain an edge over rivals
Illegally obtaining competitors intellectaal property via hacking provides an unfair advantage
BUSINESS COMPETITOR
prioritize personal financial gain over personal vendettas
Attacks on companies serve as business endeavors to make money rather than settle scores
Contractors offer services purely for financial reasons, without personal animosity towards targets
- They can be found online, including on the dark web, offering services like hacking to the highest bidder
Professional criminals
Part of the intemet that is not indexed by search engines.
Requires login, permissions, or direct access.
Examples:
Email accounts Gmail, Outlooki
Online banking & financial services (B00, PayPal)
University portals & research databases
Private social media content
Cloud storage (Google Drive, Dropboxi
DEEP WEB
• A small portion of the Deep Web that is intentionally hidden and requires special software to access.
Used for anonymous activities, both legal & illegal.
Not accessible via regular browsers (Google Chrome, Firefox, etc.). Requires Tor Browser or similar tools.
DARK WEB
-In a connected world, individuals in remote locations can target critical infrastructure
-Goals may be advanced by causing massive security failures in another nation’s infrastructure
Targets include power, nuclear energy, or water delivery systems
-Such attacks could result in large-scale loss of life
TERRORISM