Threat Classification
Most attacks can be categorized as one of three broad classes:
Intrusion: attacks meant to breach security and gain unauthorized access to a system
Blocking: attacks designed to prevent legitimate access to a system
Malware: attacks to install malware on a system
Intrusion
Intruding onto a system without permission, usually with malicious intent, colloquially called hacking, is known as cracking. Any attack designed to breach security, either via some operating system flaw or any other means, can be classified as cracking. Includes security flaws, social engineering, war driving .
Blocking/Denial of Service
A ādenial-of-serviceā attack is characterised by an explicit attempt by attackers to prevent legitimate users of a service from using that service. One often-used blocking method is flooding the targeted system with so many false connection requests that it cannot respond to legitimate requests. DoS is an extremely common attack method.
Malware
Malware is probably the most common threat to any system, including home usersā systems, small networks, and large enterprise wide-area networks.
Virus: a program that can āinfectā other programs by modifying them to include a possibly evolved copy of itself
Trojan: a benign-looking program that can be freely downloaded but contains some virus or other malware
Spyware: software that keeps track of what you do on your computer, e.g. a keylogger, periodic screenshots, something that saves cookies or browsing history. Data is stored for later retrieval or immediately sent through email or such.
Last updated