Cyberextortionist: Someone who sends threatening emails demanding payment in exchange for not exposing stolen confidential information or exploiting security flaws.
Cyberterrorist: Someone who uses the internet to damage or destroy computers and networks for political reasons, such as targeting traffic control systems, power grids, or telecommunications infrastructure. Cyberterrorism usually requires extensive planning and resources.
Computer viruses, worms, Trojan horses, and rootkits pose security risks to unprotected computers. A virus can spread and damage files and systems without permission. A worm copies itself repeatedly using resources and potentially crashing systems or networks. A Trojan horse appears harmless but carries a hidden program with malicious functions. A rootkit hides programs to gain administrator-
Cyberextortionist: Someone who sends threatening emails demanding payment in exchange for not exposing stolen confidential information or exploiting security flaws.
Cyberterrorist: Someone who uses the internet to damage or destroy computers and networks for political reasons, such as targeting traffic control systems, power grids, or telecommunications infrastructure. Cyberterrorism usually requires extensive planning and resources.
Computer viruses, worms, Trojan horses, and rootkits pose security risks to unprotected computers. A virus can spread and damage files and systems without permission. A worm copies itself repeatedly using resources and potentially crashing systems or networks. A Trojan horse appears harmless but carries a hidden program with malicious functions. A rootkit hides programs to gain administrator-
Cyberextortionist: Someone who sends threatening emails demanding payment in exchange for not exposing stolen confidential information or exploiting security flaws.
Cyberterrorist: Someone who uses the internet to damage or destroy computers and networks for political reasons, such as targeting traffic control systems, power grids, or telecommunications infrastructure. Cyberterrorism usually requires extensive planning and resources.
Computer viruses, worms, Trojan horses, and rootkits pose security risks to unprotected computers. A virus can spread and damage files and systems without permission. A worm copies itself repeatedly using resources and potentially crashing systems or networks. A Trojan horse appears harmless but carries a hidden program with malicious functions. A rootkit hides programs to gain administrator-
revenge. Cyberextortionist: is someone who uses e-mail as a vehicle for extortion. These perpetrators send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will ork if they are not paid a sum of money. Cyberterrorist: is someone who uses the Internet or network to destroy or damage computers for political reasons. The cyberterroris traffic control system, electricity-generating companies, or a telecommunications infrastructure. This is similar to a term called cyberwarfare which describes an attack whose goal ranges from disabling a s computer network to crippling a country. Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.
COMPUTER VIRUSES, WORMS, TROJAN HORSES, AND ROOTKITS
Every unprotected computer is susceptible to the first type of computer security risk which are computer virus, worm, Trojan horse, and/or rootkit.
Virus: A computer virus is a potentially damaging computer program that affects,
or infects a computer negatively by altering the way the computer works without the knowledge or permission. Once the virus infects the computer, it can spread throughout and may damage files and system software, including the operating system. Worm: is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.