翻訳と辞書 |
List of cyber attack threat trends : ウィキペディア英語版 | List of cyber attack threat trends
A list of cyber attack threat trends is presented in alphabetical order. These methods were used between the 1990s and 2015.〔p.9, Lord〕
* Analysis of vulnerabilities in compiled software without source code * Anti-forensic techniques * Automated probes and scans * Automated widespread attacks * Cyber-threats & bullying (not illegal in all jurisdictions) * Distributed attack tools * Email propagation of malicious code * Executable code attacks (against browsers) * GUI intrusion tools * Industrial espionage * Internet social engineering attacks * Network sniffers * Packet spoofing * Session-hijacking * Sophisticated botnet command and control attacks * "Stealth" and other advanced scanning techniques * Targeting of specific users * Widespread attacks on DNS infrastructure * Widespread attacks using NNTP to distribute attack * Wide-scale trojan distribution * Wide-scale use of worms * Widespread, distributed denial-of-service attacks * Windows-based remote access trojans (Back Orifice) ==Citations and notes==
抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「List of cyber attack threat trends」の詳細全文を読む
スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース |
Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.
|
|