Geoscience Reference
In-Depth Information
Phishers—Individuals, or small groups, who execute phishing schemes in an
attempt to steal identities or information for monetary gain. Phishers may
also use spam and spyware/malware to accomplish their objectives.
Spammers—Individuals or organizations who distribute unsolicited e-mail
with hidden or false information in order to sell products, conduct phishing
schemes, distribute spyware/malware, or attack organizations (i.e., denial of
service).
Spyware/Malware Authors—Individuals or organizations with malicious intent
carry out attacks against users by producing and distributing spyware and mal-
ware. Several destructive computer viruses and worms have harmed files and
hard drives, including the Melissa Macro Virus, the Explore.Zip worm, the CIH
(Chernobyl) Virus, Nimda, Code Red, Slammer, and Blaster.
Insiders—The disgruntled organization insider is a principal source of com-
puter crime. Insiders may not need a great deal of knowledge about computer
intrusions because their knowledge of a target system often allows them to
gain unrestricted access to cause damage to the system or to steal system data.
The insider threat also includes outsourcing vendors as well as employees who
accidentally introduce malware into systems.
Foreign Intelligence Services—Foreign intelligence services use cyber tools
as part of their information-gathering and espionage activities. In addition,
several nations are aggressively working to develop information warfare doc-
trine, programs, and capabilities. Such capabilities enable a single entity to
have a significant and serious impact by disrupting the supply, communica-
tions, and economic infrastructures that support military power—impacts
that could affect the daily lives of U.S. citizens across the country.
Criminal Groups—Criminal groups seek to attack systems for monetary
gain. Specifically, organized crime groups are using spam, phishing, and
spyware/malware to commit identity theft and online fraud. International
corporate spies and organized crime organizations also pose a threat to the
United States through their ability to conduct industrial espionage and large-
scale monetary theft and to hire or develop hacker talent.
Bot-Network Operators—Hackers who, instead of breaking into systems for
the challenge or bragging rights, take over multiple systems in order to coordi-
nate attacks and to distribute phishing schemes, spam, and malware attacks.
The services of these networks are sometimes made available in underground
markets (e.g., purchasing a denial-of-service attack, servers to relay spam, or
phishing attacks).
A few more definitions help to explain the differences in the different types of mali-
cious code that can be used to corrupt technological systems:
Virus—This type of code requires the victim to perform an action, such as
open an e-mail, before it infects your computer.
Search WWH ::




Custom Search