User Tools

Site Tools


ci2011:security_attacks

This is an old revision of the document!


Security Attacks

There are all kinds of Security Attacks out there. A few are listed below:

  • Black Hat
  • BlueBugging
  • Botnet (Zombie PCs)
  • Crapware
  • DoS (Denial of Service)
  • Hacker Attacks
  • Keylogging
  • Logic Bomb
  • Phishing
  • Pod Slurping
  • Ransomware
  • Scareware
  • Script Kiddies
  • Sidejacking
  • Smishing
  • Social Engineering
  • Trojan Horse
  • Virus
  • White Hat
  • Worm

Black Hat: Black Hat is a group of hackers that attack computer systems and use computers to attack systems for profit, for fun, or for political motivations. They also utilize botnets to deliver viruses and worms.

BlueBugging: BlueBugging is when someone illegally accesses a cellular phone using Bluetooth wireless technology. This would allow the hacker to make phone calls and to do texting via bluetooth that they BlueBugged into. This type of attack can only occur when the hacker and cellphone are within range of each other which is about 30 feet.

Botnet (Zombie PCs): Botnet is the combination of Robot and Network. Botnet computers are Internet computers that inconspicuously forward email, worms, viruses, and spam across the Internet without the users knowledge.

Crapware:

DoS (Denial of Service):

Hacker Attacks:

Keylogging:

Logic Bomb:

Phishing:

Pod Slurping: Pod Slurping is when an iPod starts copying tons of data from a computer on to its internal hard drive. This can occur in as little as 65 seconds.

Ransomware: Ransomware is when a program makes a computer unusable and in order for the computer to become useful again a ransom is requested.

Scareware: Scareware is software that tricks a person into downloading it in hopes of fixing their computer problems. The person will use the software to perform a scan of their computer where viruses would be listed (excluding the scareware) and in order to fix the computer and rid it of the viruses the person would have to pay a fee for a “full” or “registered” version of the scareware application.

Script Kiddies:

Sidejacking: Sidejacking is a form of hacking where a person's website account and password are obtained through accessing the session-id that the website sends. The hacker will then use the session-id to gain access to the person's account on the website.

Smishing: Smishing is also known as SMS phishing which is a phishing attack that is specific to cellphones. An SMS message would be received by the target cellphone with a link to a malware application specific for cellphones.

Social Engineering:

Trojan Horse:

Virus:

White Hat: White Hat is when a hacker notices a vulnerability in a system and fixes it. It is called White Hat because in the old westerns, the guy in the white hat was the good guy and the guy in the black hat was the bad guy.

Worm: A worm is a virus that slowly makes a computer useless or too slow to use. It can either alter data on the computer or erase it.

See e.g.: http://lifehacker.com/5749098/the-computer-attacks-youve-never-heard-of

ci2011/security_attacks.1299264073.txt.gz · Last modified: 2011/03/04 13:41 (external edit)