Professional Documents
Culture Documents
It is someone who uses email as a vehicle for extortion. They send companies threatening
messages indicting they will expose confidential information, exploit a security flaw, or launch an
attack that will compromise the company’s network – if they are paid a huge sum of money.
• Cyberterrorist
They use the internet or network to destroy or damage computers for political reasons. They
usually require a team of high skilled individuals, paying them millions of dollars to make several
These are attacks that jeopardize security. These include viruses, worms, and Trojan horses,
• Virus
altering the way a computer works without the user’s knowledge or permission.
• Worm
• Trojan Horse
A program that hides within or looks like a legitimate program. Just like virus and worms, Trojan
A program that acts without a user’s knowledge and deliberately alter the computer’s operations.
• Payload