Difference between revisions of "Offensive weapons (virusses/worms/hackers)"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
==Description== | ==Description== | ||
People will always find new ways to exploit certain systems. The current technological weapons are: | People will always find new ways to exploit certain systems. The current technological weapons are: | ||
- Distrubuted Denial of Service Attacks | |||
- Virusses | |||
- Trojan Horses | |||
- Malware | |||
- Exploits | |||
These weapons can be used to obtain access or information from computer systems and are used often. | These weapons can be used to obtain access to or information from computer systems and are used often. | ||
==Enablers== | ==Enablers== |
Revision as of 20:28, 18 May 2008
Description
People will always find new ways to exploit certain systems. The current technological weapons are:
- Distrubuted Denial of Service Attacks - Virusses - Trojan Horses - Malware - Exploits
These weapons can be used to obtain access to or information from computer systems and are used often.
Enablers
Evolution of software (new algorithms make better virusses)
Expansion of the internet
Carelessness and unawareness of computer-users
Social engineering
Unsecure software
Inhabitors
Growing awareness of the weapons
Software Architecture more secure
Evolution of defense mechanisms
Cyberlaws?
Paradigms
Owners of botnets recieve money to send spam and DDoS targets. It's getting more organized and commercial. needs more explanation