Types of Malicious Attacks Flashcards
Someone who violates computer or Internet security maliciously or for illegal personal gain.
Black hat hacker
An individual who causes problems, steals data, and corrupts systems
Hacker
An employee or contractor who attempts to gain financially and/or disrupt a company’s information systems and business operations
Malicious insider
An individual who captures trade secrets and attempts to gain an unfair competitive advantage
Industrial spy
Someone who attacks a computer system or network for financial gain
Cybercriminal
An individual who hacks computers or websites in an attempt to promote a political ideology
Hacktivist
Someone who attempts to destroy the infrastructure components of governments, financial institutions, and other corporations, utilities, and emergency response units
Cyberterrorist
Hangs out in active memory of computer and duplicates itself.
Worm
Hidden malicious program attached to something that seems harmless.
Trojan Horse
Type of trojan horse that triggers automatically by a specific event
Logic Bomb
Combines features of Virus, Worm, Trojan Horse, etc., and can attack from any vulnerability
Blended Threat
When a hacker makes lots of computers flood a site with many small tasks to make it useless for normal users.
Distributed Denial-of-service (DDos) Attack
Law that makes it legal to send spam as long as there isn’t a false return address, and does have a label specifying an ad, and opt out button.
Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act
Large group of computers used (with or without consent of owners) to launch DDos Attack
Botnet
Enables administrator access to computer without owners consent
Rootkit
Where an intruder gains access to a computer and stays. More interested in stealing data than disrupting services.
Advanced Persistent Threat (APT)
a type of phishing that targets a specific organization.
Spear phishing
A type of phishing done through text.
smishing
A type of phishing done through voicemail
Vishing
Deployment of Malware that secretly steals data from government agencies, or companies. Most likely to leverage an unfair advantage.
Cyber espionage
The use of a malicious program used to achieve political, religious, or ideological goals.
Cyberterrorism
An organization that analyzes reported cyber attacks.
U.S. Computer Emergency Readiness Team (US-CERT)