1. Social engineering - is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques; essentially a fancier, more technical way of lying. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim.
2. Salami slicing - is a series of many minor actions, often performed by clandestine means, those together results in a larger action that would be difficult or illegal to perform at once.
3. Trojan horse - is malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system. "It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems", as Cisco describes.
4. Distributed Denial of service - is an attempt to make a computer resource unavailable to its intended users.
5. Sniffer - is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network.
6. IP spoofing - the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system.
7. Brute Force Attack - is a strategy used to break the encryption of data. It involves traversing the search space of possible keys until the correct key is found.
8. Shoulder surfing - refers to using direct observation techniques, such as looking over someone's shoulder, to get information.[1] Shoulder surfing is particularly effective in crowded places because it's relatively easy to observe someone as they:
• fill out a form
• enter their PIN at an automated teller machine or a POS terminal
• use a calling card at a public pay phone
• Enter passwords at a cybercafé, public and university libraries, or airport kiosks.
• Enter a code for a rented locker in a public place such as a swimming pool or airport.
9. Sabotage - is a deliberate action aimed at weakening another entity through subversion, obstruction, disruption, or destruction. In a workplace setting, sabotage is the conscious withdrawal of efficiency generally directed at causing some change in workplace conditions. One who engages in sabotage is a saboteur. As a rule, saboteurs try to conceal their identities because of the consequences of their actions. For example, whereas an environmental pressure group might be happy to be identified with an act of sabotage, it would not want the individual identities of the perpetrators known.
10. Electromagnetic Interference - is a disturbance that affects an electrical circuit due to either electromagnetic conduction or electromagnetic radiation emitted from an external source. The disturbance may interrupt, obstruct, or otherwise degrade or limit the effective performance of the circuit. The source may be any object, artificial or natural, that carries rapidly changing electrical currents, such as an electrical circuit, the Sun or the Northern Lights.
No comments:
Post a Comment