Cybersecurity Threats and Roles: A Comprehensive List
Cybersecurity Threats and Roles
Logic Bombs
Logic bombs are certain parts of code in programs that remain dormant, without performing any functions, until they are activated. At that point, the function they perform is not part of the original program, but generally, it is a harmful action.
Covert Channels
Covert channels (or hidden channels) are channels that allow a process to transfer information, violating the security policy of the system. In other words, a process transmits information to others (local or remote) that are not authorized to read such information.
Cracker
A cracker is any person who violates the security of a computer system in a similar way to a hacker. However, unlike the latter, a cracker intrudes for personal gain or mischief.
Exploit
An exploit is a piece of software, a chunk of data, or a script to automate the use of an error, failure, or vulnerability to cause unwanted or unexpected behavior in software, hardware, or an electronic component.
Worms
A worm is a program that can run and spread itself across networks, sometimes carrying viruses or bugs, taking advantage of the systems it connects to in order to cause harm. Although they are difficult to program, their number is very high, and the damage they can cause is very large. The largest Internet security incident was the Internet Worm, a worm that in 1988 caused millions in losses and infected more than 6,000 machines connected to the network.
Hacker
A hacker is a person who belongs to one of these communities or subcultures, which are different but not completely independent.
Hotfix
A hotfix is a package that may include multiple files and is used to solve a specific bug in a computer application.
Rabbit Programs or Bacteria
Under this name are known programs that do nothing useful but simply engage in reproducing until the number of copies depletes system resources (memory, processor, etc.), resulting in a denial of service.
Backdoor
A backdoor is a specific sequence within the programming code by which to avoid security systems of the algorithm (authentication) to access the system.
Trojan
A trojan is malicious software disguised as harmless. It covertly runs on the system and allows remote access by an unauthorized user.
Virus
A virus is a code sequence that is inserted into an executable file (called the host). When the file is executed, the virus runs, inserting itself into other programs. Everyone knows the effects of viruses in some operating systems like Windows, but in GNU/Linux, viruses are not usually a serious security problem.
Phreakers
Phreakers are crackers who sabotage telephone networks to make free calls.
Sniffers
Sniffers are networking experts who analyze data traffic for packets that are transmitted over the network.
Lammers
Lammers are young people without much knowledge of computers but pretend to be hackers.
Cyberterrorist
Cyberterrorists are experts in programming, networking, and systems that create viruses.
Carders
Carders are people who engage in attacking card systems.
Newbie
A newbie is a new hacker.
Spoofing
Spoofing spoofs a PC or any data from it (MAC).
Sniffing
Sniffing monitors and analyzes network traffic to gather information.
Malware
Malware is a malicious program on our computer.
Phishing
Phishing deceives the user to obtain their confidential information.
LOPD
The LOPD (Organic Law on Data Protection) is a law that regulates the protection of personal data and is supervised by the Spanish Agency for Data Protection. The purpose of this law is to guarantee and protect fundamental rights.
