List of cyber attack threat trends
Encyclopedia
A list of cyber attack threat trends is presented in the order of sophistication which generally corresponds to the chronology of computer network used between the 1990s and 2008.
  • Internet social engineering attacks
  • Network sniffers
  • Packet spoofing
  • Session-hijacking
  • Cyber-threats & bullying (not illegal in all jurisdictions)
  • Automated probes and scans
  • GUI intrusion tools
  • Automated widespread attacks
  • Widespread, distributed denial-of-service attacks
  • Industrial espionage
    Industrial espionage
    Industrial espionage, economic espionage or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security purposes...

  • Executable code attacks (against browsers)
  • Analysis of vulnerabilities in compiled software without source code
  • Widespread attacks on DNS infrastructure
  • Widespread attacks using NNTP to distribute attack
  • "Stealth" and other advanced scanning techniques
  • Windows-based remote controllable trojans (Back Orifice
    Back Orifice
    Back Orifice is a controversial computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a word play on Microsoft BackOffice Server software.Back Orifice was designed with...

    )
  • Email propagation of malicious code
  • Wide-scale trojan distribution
  • Distributed attack tools
  • Targeting of specific users
  • Anti-forensic techniques
  • Wide-scale use of worms
  • Sophisticated botnet command and control attacks
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK