Please enable JavaScript.
Coggle requires JavaScript to display documents.
Computer Attacks, lal, download - Coggle Diagram
Computer Attacks
Steps that criminal use
-
-
-
-
6. Cover tracks
create 'back doors' to obtain access if their initial attack is discovered and controls implemented to block that method of entry
-
Techniques
Hacking
Unathorized access, modification, or use of an electronic device or some element of a computer system
Hijacking
Gaining control of someone else's computer to carry out illicit activities such as sending spam without the computer user's knowledge
Botnet
A network of powerful and dangerous hijacked computers that are used to attack system or spread malware.
Zombies
Hijacked computers, typically part of a botnet, that are used to launch a variety of of Internet attacks
Bot herder
The person who creates a botnet by installing software on PCs that responds to the bot herder's electronic instructions
-
Brute force attack
Trial and error method that uses software to guess information such as the user ID and the password, needed to gain access to a system
Spamming
Simultaneously sending the same unsolicited message to many poeple of ten in an attempt to sell them something
Password cracking
Recovering passwords by trying every possible combination of upper and lower case letters and number
Dictionary attack
Software that generates user ID and password guesses using a dictionary of possible user IDs and passwords to reduce the number of guesses required
Spoofing
-Altering some part of an electronic communication to make it look as if someone else sent the communication in order to gain the trust of the recipient
-
-
-
-
-
-
-
Economic espionage
Theft of information , trade secrets and intellectual property
-
-
-
-
-
-