List of cyber attack threat trends
Encyclopedia
A list of cyber attack threat trends is presented in the order of sophistication which generally corresponds to the chronology of computer network used between the 1990s and 2008.
- Internet social engineering attacks
- Network sniffers
- Packet spoofing
- Session-hijacking
- Cyber-threats & bullying (not illegal in all jurisdictions)
- Automated probes and scans
- GUI intrusion tools
- Automated widespread attacks
- Widespread, distributed denial-of-service attacks
- Industrial espionageIndustrial espionageIndustrial espionage, economic espionage or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security purposes...
- Executable code attacks (against browsers)
- Analysis of vulnerabilities in compiled software without source code
- Widespread attacks on DNS infrastructure
- Widespread attacks using NNTP to distribute attack
- "Stealth" and other advanced scanning techniques
- Windows-based remote controllable trojans (Back OrificeBack OrificeBack Orifice is a controversial computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a word play on Microsoft BackOffice Server software.Back Orifice was designed with...
) - Email propagation of malicious code
- Wide-scale trojan distribution
- Distributed attack tools
- Targeting of specific users
- Anti-forensic techniques
- Wide-scale use of worms
- Sophisticated botnet command and control attacks