Unit 5B: Cyberthreats Flashcards
Script Kiddies
teenagers that use software for break-ins
Malicious Hackers
hack with malicious intentions
Hacktivists
hack to spread message about a cause
Black-Hat hackers
hack to steal or destroy for illegal profit
Benign hackers
hack for the thrill
Benevolant Hackers
hack with owner’s knowledge to find weak points in security
Denial of Service Attack
overloads programs so it denies access to users
Worms
program that repeatedly copies itself on computer
Rootkits
Root: account for system administration
Kit: malware secretly introduced to computer
Rootkit: gives attacker “supperpowers” over computer
Blended Threat
mix of everything
Zombies
takes control of multiple computers at once, ability to update and introduce new malware
infected computers = zombies
Ransomeware
holds computer data hostage until ransom is paid
Time, Logic and Email Bomb
Time - at given time
Logic - after given event occurs
Email - subscribes email address to everything to overload it
Phone Malware
phone to phone, file from internet
Botnet (Robot Network)
network of computers which have been implanted with instructions to wait for commands from person controlling the botnet