You are on page 1of 1

• Cyberextortionist

It is someone who uses email as a vehicle for extortion. They send companies threatening

messages indicting they will expose confidential information, exploit a security flaw, or launch an

attack that will compromise the company’s network – if they are paid a huge sum of money.

• Cyberterrorist

They use the internet or network to destroy or damage computers for political reasons. They

usually require a team of high skilled individuals, paying them millions of dollars to make several

years of planning to make the attack.

Internet and Network Attacks

These are attacks that jeopardize security. These include viruses, worms, and Trojan horses,

botnets, denial or service attacks, back doors, and spoofing.

• Virus

A potentially damaging computer program that affects or infects a computer negatively by

altering the way a computer works without the user’s knowledge or permission.

• Worm

A program that copies itself repeatedly.

• Trojan Horse

A program that hides within or looks like a legitimate program. Just like virus and worms, Trojan

horses are classified as Malware.

• Malware (malicious software)

A program that acts without a user’s knowledge and deliberately alter the computer’s operations.

• Payload

The destructive event or prank that a program is intended to deliver.

You might also like