-
Espionage (Leslie)
-
Technology
- Spyware
- Malware
- Adware
- Phishing
- Botnet
-
Logger
- Keystroke
- Monitor
-
Wi-fi Tools
- Using localized networks
- Using Mobile tech
- Using tablets
-
Software
- Updates
- Customized Scripts
- Loaded externally
- Hacking
- Trojans
-
Methods
-
Email
- PDF attachments
- Meeting Requests with Attachments
- DOC attachments
- Picture attachments
- Software updates
- USB/external devices
- Employees
- Contractors/Consultants
- Outsiders with Access
- Peer-to-Peer networks
-
Email
-
Technology
-
Cyber Terrorism (Joe)
-
Methods
-
Sabotage
-
Internal
- Planting a Mole
- Disgruntled Employee
-
External
- Activists
- Terrorist Groups
- State Actors
-
Internal
-
Website Defacement
- Send Message
- Publicity
-
Denial of Service
- Deter Communication
- Suspend System Activity (permanently or temporarily)
-
Sabotage
-
Technology
-
Wired
-
Internet
- Exploiting Defaults
- Faulty IIS (Internet Information Service)
- Data Mining
- Authorization Bypass
-
Software
- Trojan Horse
- Virus
- Worm
- Hardware
-
Stealing Password
- Dictionary Attacks
- Hybrid Attacks
- Brute Force Attacks
-
Email
- Man-in-the-Middle
- Phishing
- DNS hijacking
- URL manipulation
-
Internet
-
Wireless
- Eavesdropping
- Interference
- Packet Sniffing
-
Wired
-
Methods
-
Cyber Identity Theft (Laura)
-
Technology
-
Malware
- Trojans
- Spyware
- Worms
-
Bots
- Botnets
- Rootkits
- Viruses
-
Exploit tools and kits
- ZeuS
- Email harvesters
-
Malware
-
Precedents
- Bluetooth-enabled devices planted at gas pumps to read credit card details
- Data breaches at large companies (TJ Maxx, Heartland, …)
- Pharmamed.php (email harvesting)
- Bluesnarfing, bluebugging, HeloMoto
-
Methods
-
Computers
-
Hacking
- War-driving
- Eavesdropping
- Password-based attacks
- Compromised-key attacks
- Man-in-the-middle attacks
- Sniffers
-
Physical acquisition
- Stealing devices
- Acquiring improperly disposed-of device
-
Phishing
- Pharming
-
Mass rebellion
- P2P services
-
Disclosure by employees
- Disgruntled employees
- Bribery
- Unintentional disclosure
-
Posing
- Scam within a scam
- Posing as authority, mass-emailing victims of past identity theft
- Spoofing
- Pranking
- Registering another person for a dating site, for example
-
Hacking
-
Mobile devices
-
Hacking
- War-dialing
- Eavesdropping
- Password-based attacks
- Sniffers
- Bluebugging and bluesnarfing
-
Phishing
- Smishing
-
Disclosure by employees
- Disgruntled employees
- Bribery
- Unintentional disclosure
-
Physical acquisition
- Stealing devices
- Acquiring improperly disposed-of device
-
Direct observation
- Looking over the user’s shoulder
- Camera/video capabilities on devices
-
Hacking
- ATM skimming
-
Computers
-
Predictions (2011)
- Exploitation of mobile GPS location information
- More attacks on social networking sites
- Increase in “mixed threats” (email, Web, social media)
-
Technology