4 Costs of Cyber crime
Spyware
Adware
Phishing
Pharming
Baiting
Similar to phishing (sending emails to fake websites) but the the baiter promises something to the recipient
Quid pro quo
Keystroke Loggers
Sniffing
Intercepts information by recording and capturing network traffic
Spoofing
Poses as an authorized user to find information
Computer fraud
Unauthorized use of computer data for personal gain
CIA Triangle
Virus
Worm
Logic bombs
Trojan program
Denial of service (DoS)
Flooding a network or server with service requests to prevent user from accessing the system
Mirror disks
Back up disk
Uninteruptable power supply (UPS)
Back up battery like generator
Fraud tolerant systems
Ensures availability in the event of a system failure by using a combination of hardware and software
Backdoor (trapdoor)
Allows the designer to bypass system security and sneak into the system later to access programs or files
Blended threat
Security threat that combines the characteristics of computer viruses, worms, and other malicious codes found on public and private networks.
Botnet
Type of internal threat (Denial of service DoS) attack that includes a network of computer and loT (internet of things: interrelated computing devices) devices infected with malicious software
Telephony denial of service (TDoS) attacks
Use high volumes of automated calls to tie up a target phone system, halting incoming and outgoing calls