Tuesday, September 4, 2012

Hackers Tactics

o   Access to classified, proprietary, technology data
o   Assault on an employee
o   Blackmail
o   Bomb/Terrorism
o   Break-ins
o   Browsing of proprietary information
o   Computer abuse
o   Computer crime (e.g., cyber stalking)
o   Denial of service
o   Economic exploitation
o   Equipment failures
o   Fraud and theft
o   Fraud scheme
o   Fraudulent act-replay, impersonation, interception
o   Hacking
o   Information bribery
o   Information theft
o   Information warfare
o   Input of falsified, corrupted data
o   Interception
o   Intrusion on personal privacy
o   Malicious codes
o   Multiple Actions
o   Sale of personal information
o   Social engineering
o   Spoofing
o   System attack
o   System bugs
o   System intrusion, break-ins
o   System penetration
o   System sabotage
o   System tampering
o   Unauthorized access
o   Unauthorized acts combination
o   Viruses

No comments: