In: Computer Science
Describe and give an example of the following: CyberTerrorism, Hacktivism, Black Hat Hacking, CyberCrime, CyberEspionage, CyberWar.
CYBER TERRORISM
Cyberterrorism is any attack against information, computer systems,
computer programs, and data or information with the aim of
violence against secret agents and subnational groups. The main aim
behind cyberterrorism is to cause harm and
destruction.
Cyberterrorism can be explained as internet terrorism. With the
advent of the internet, individuals and groups are misusing
the
technology to threaten individuals, certain groups, religions or
beliefs. Cyberterrorism can be broadly categorized
under three major categories:
Simple: This consists of basic attacks including the hacking of
an individual system.
Advanced: These are more complex or bigger attacks and can involve
hacking multiple systems or networks.
Complex: These are coordinated attacks that can have a large-scale
impact and make use of complex tools.
Examples: Hacking into computer systems, introducing viruses to vulnerable networks, web site defacing.
HACTIVISM
Hacktivism is the act of misusing a computer system or network for
a social or political reason. Individuals who
perform hacktivism are known as hacktivists. Hacktivists are
generlly individuals, but there are also groups of
hacktivists
and they operate in coordination with aech other.
Example: Website defacement or information theft.
BLACK HAT HACKING
A black hat hacker is a person who attempts to find computer
security and exploit them for personal financial gain
or other malicious reasons. This whole process is known as Black
Hat hacking. They often do so to steal or gain access
to passwords, financial information, and other personal data.
Examples: altering functions of websites and systems, shutting down systems.
CYBER CRIME
Cybercrime is defined as a crime in which a computer is the object
of the crime or is used as a
tool to commit an crime. They can also use computers for
communication and data storage.
They can be divided into two categories:
1. Crimes that target computer networks or devices
2. Crimes that use computer networks to advance other criminal
activities.
Example: Stealing identities, child pornography.
CYBERESPIONAGE
The use of computer networks to gain illicit access to confidential
information, typically that held by a government or other
organization.It is a form of cyber attack that steals sensitive
data or intellectual property to gain
an advantage over a competitive company or government entity.
Example: stealing data of other competitive company
CYBER WAR
Cyberwarfare is a conflict initiated as a attack on an enemy's
computer and information systems.It means to accquire
information
of enemyfrom their computers. It is only known as Cyber
Warfare.
Example: Stuxnet.