Technology
Wired
Internet
Exploiting Defaults
Faulty IIS (Internet Information Service)
Data Mining
Authorization Bypass
Software
Trojan Horse
Virus
Logger
Keystroke
Monitor
Customized Scripts
Updates
Worm
Holes in non-updated software
Malware
Trojans
Spyware
Worms
Bots
Botnets
Rootkits
Viruses
Adware
Hardware
Stealing Password
Dictionary Attacks
Hybrid Attacks
Brute Force Attacks
Logger Software
Email
Man-in-the-Middle
Phishing
DNS hijacking
URL manipulation
Email harvesters
Exploit tools and kits
ZeuS
Wireless
Eavesdropping
Interference
Wi-fi Tools
Using localized networks
Using Mobile tech
Using tablets
Packet Sniffing
Cyber Terrorism (Joe)
Methods
Sabotage
Internal
Planting a Mole
Disgruntled Employee
External
Activists
Terrorist Groups
State Actors
Website Defacement
Send Message
Publicity
Denial of Service
Deter Communication
Suspend System Activity (permanently or temporarily)
Cyber Identity Theft (Laura)
Precedents
Bluetooth-enabled devices planted at gas pumps to read credit card details
Data breaches at large companies (TJ Maxx, Heartland, ...)
Pharmamed.php (email harvesting)
Bluesnarfing, bluebugging, HeloMoto
Methods
Computers
Hacking
War-driving
Eavesdropping
Password-based attacks
Compromised-key attacks
Man-in-the-middle attacks
Sniffers
Physical acquisition
Stealing devices
Acquiring improperly disposed-of device
Phishing
Pharming
Mass rebellion
P2P services
Disclosure by employees
Disgruntled employees
Bribery
Unintentional disclosure
Posing
Scam within a scam
Posing as authority, mass-emailing victims of past identity theft
Spoofing
Pranking
Registering another person for a dating site, for example
Mobile devices
Hacking
War-dialing
Eavesdropping
Password-based attacks
Sniffers
Bluebugging and bluesnarfing
Phishing
Smishing
Disclosure by employees
Disgruntled employees
Bribery
Unintentional disclosure
Physical acquisition
Stealing devices
Acquiring improperly disposed-of device
Direct observation
Looking over the user's shoulder
Camera/video capabilities on devices
ATM skimming
Predictions (2011)
Exploitation of mobile GPS location information
More attacks on social networking sites
Increase in "mixed threats" (email, Web, social media)
Espionage (Leslie)
Precedents
Nitro Attacks to install Poison.Ivy Trojan through email
Top executives spying at Renault
"Gameover" DDoS attacks against Banks
Phishing attacks against RSA
Methods
Email with attachments
PDF
Meeting Requests
Word .DOC
Pictures
Software updates
USB/external devices
Employees
Contractors/Consultants
Outsiders with Access
Peer-to-Peer networks
Types of Data Stolen
Intellectual Property
Patent information
Research & Development
Financial
Personnel
Company Planning
Strategic plans
Pricing information
Cost lists
Marketing plans
Customer lists
Most at-risk Industries
High-tech
Computer hardware/software
laser technology
semi-conductor technology
Pharamaceutical
Biotech
Manufacturing firms
Aerospace
Energy research
Advanced materials & coatings
Transportation & Engine technology
Service Industry
Defense Industries
Stealth technologies
Telecommunications