List of cyber attack threat trends

List of cyber attack threat trends

A list of cyber attack threat trends is presented in the order of sophistication which generally corresponds to the chronology of computer network used between the 1990s and 2008. [p.9, Lord]

* Internet social engineering attacks
* Network sniffers
* Packet spoofing
* Hijacking sessions
* Automated probes and scans
* GUI intruder tools
* Automated widespread attacks
* Widespread denial-of-service attacks
* Executable code attacks (against browsers)
* Techniques to analyse code with Vulnerabilities without source
* Widespread attacks on DNS infrastructure
* Widespread attacks using NNTP to distribute attack
* "Stealth" and other advanced scanning techniques
* Windows-based remote controllable Trojans (Back Orifice)
* Email propagation of malicious code
* Wide-scale Trojan distribution
* Distributed attack tools
* Distributed denial of service attacks
* Targeting of specific users
* Anti-forensic techniques
* Wide-scale use of worms
* Sophisticated command and control attacks

Citations and notes

References

* Lord, William T., Major General, USAF, USAF Cyberspace Command: To Fly and Fight in Cyberspace, "Strategic Studies Quarterly", Fall 2008


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Cyberwarfare — Cyberwar redirects here. For the video game, see Cyberwar (video game). For the 2004 movie, see Cyber Wars (film). For the 1999 MMOG, see Cyber Wars. Computer security Secure operating systems Security architecture Security by design …   Wikipedia

  • Stuxnet — is a computer worm discovered in June 2010. It targets Siemens industrial software and equipment running Microsoft Windows.[1] While it is not the first time that hackers have targeted industrial systems,[2] it is the first discovered malware… …   Wikipedia

  • Cyberwarfare in the United States — is the United States Cyber Commands military strategy of proactive cyber defence and the use of cyberwarfare as a platform for attack.[1] The United States Department of Defense sees the use of computers and the Internet to conduct warfare in… …   Wikipedia

  • Duqu — Symantec Diagram on Duqu Duqu is a computer worm discovered on 1 September 2011, thought to be related to the Stuxnet worm. The Laboratory of Cryptography and System Security (CrySyS)[1] of the Budapest University of Technology and Economics in… …   Wikipedia

  • Project Chanology — Protesters in Guy Fawkes masks outside a Scientology center at the February 10, 2008 Project Chanology protest. Project Chanology …   Wikipedia

  • SCADA — is the abbreviation for Supervisory Control And Data Acquisition . It generally refers to an industrial control system: a computer system monitoring and controlling a process. The process can be industrial, infrastructure or facility based as… …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • People's Liberation Army —   中国人民解放军   Emblem of the People s Liberation Army Founded August 1, 1927 Service branches …   Wikipedia

  • Organized crime — Crime syndicate redirects here. For the DC Comics group of villains, see Crime Syndicate. For other uses, see Organized crime (disambiguation). Al Capone, a name often associated with organized crime …   Wikipedia

  • Australian Defence Force — Australian Defence Force …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”