Uto El Que Lee

Páginas: 6 (1316 palabras) Publicado: 27 de julio de 2011
Your guide to the seven types of malicious hackers

http://www.infoworld.com/print/150636

Published on InfoWorld (http://www.infoworld.com) Home > Security Central > Security Adviser > Your guide to the seven types of malicious hackers > Your guide to the seven types of malicious hackers

Your guide to the seven types of malicious hackers
By Roger A. Grimes Created 2011-02-08 03:00AMWhen I learned over the weekend that hackers had planted malware on a Nasdaq Web server [1] , I wasn't exactly surprised. It's the rare company that isn't owned by hackers. Even the most well-defended organization will likely find itself under attack by outsiders. Whether you're attacked today or tomorrow, it's important to understand the motivation and objective of your intruders -- doing so canhelp you devise an appropriate defense. Malicious hackers can, in fact, be broken out under some broad classifications. [ Master your security with InfoWorld's interactive Security iGuide [2]. | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter [3]. ] Malicious hacker No. 1: Cyber criminals Professional criminals [4] comprise the biggest group ofmalicious hackers, using malware and exploits to steal money. It doesn't matter how they do it, whether they're manipulating your bank account, using your credit card
1 of 4 02/15/2011 06:04 PM

Your guide to the seven types of malicious hackers

http://www.infoworld.com/print/150636

numbers, faking antivirus programs, or stealing your identity or passwords. Their motivation is fast, bigfinancial gain. Malicious hacker No. 2: Spammers and adware spreaders Purveyors of spam and adware make their money through illegal advertising, either getting paid by a legitimate company for pushing business their way or by selling their own products. Cheap Viagra, anyone? Members of this group believe they are just "aggressive marketers." It helps them sleep at night. Malicious hacker No. 3:Advanced persistent threat (APT) agents Intruders engaging in APT-style attacks [5] represent well-organized, well-funded groups -- often located in a "safe harbor" country -- and they're out to steal a company's intellectual property. They aren't out for quick financial gain like cyber criminals; they're in it for the long haul. Their dream assignment is to essentially duplicate their victim's bestideas and products in their own homeland, or to sell the information they've purloined to the highest bidder. Malicious hacker No. 4: Corporate spies Corporate spying is not new; it's just significantly easier to do, thanks to today's pervasive Internet connectivity. Corporate spies are usually interested in a particular piece of intellectual property or competitive information. They differ from APTagents in that they don't have to be located in a safe-harbor country. Corporate espionage groups aren't usually as organized as APT groups, and they are more focused on short- to midterm financial gains. Malicious hacker No. 5: Hacktivists Lots of hackers are motivated by political, religious, environmental, or other personal beliefs. They are usually content with embarrassing their opponents ordefacing their websites, although they can slip into corporate-espionage mode if it means they can weaken the opponent. Think WikiLeaks [6] . Malicious hacker No. 6: Cyber warriors Cyber warfare is a city-state against city-state exploitation with an endgame objective of disabling an opponent's military capability. Participants may operate as APT or corporate spies at times, but everything theylearn is geared toward a specific military objective. The Stuxnet worm is a great example [7] of this attack method. Malicious hacker No. 7: Rogue hackers There are hundreds of thousands of hackers who simply want to prove their skills, brag to friends, and are thrilled to engage in unauthorized activities. They may participate in other types of hacking (crimeware), but it isn't their only...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • POR QUE SE LEE Y NO SE LEE
  • LEeer
  • leean
  • NO LO LEEAN
  • leea
  • leeer
  • leee
  • Leee

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS