Difference between revisions of "Offensive weapons (virusses/worms/hackers)"
Jump to navigation
Jump to search
(New page: ==Description== ==Enablers== ==Inhabitors== ==Paradigms== ==Experts== ==Timing== ==Web Resources==) |
|||
Line 1: | Line 1: | ||
==Description== | ==Description== | ||
People will always find new ways to exploit certain systems. The current technological weapons are: | |||
* Distrubuted Denial of Service Attacks | |||
* Virusses | |||
* Trojan Horses | |||
* Malware | |||
* Hackers | |||
These weapons can be used to obtain access or information from computer systems and are used often. | |||
==Enablers== | ==Enablers== |
Revision as of 17:19, 11 May 2008
Description
People will always find new ways to exploit certain systems. The current technological weapons are:
* Distrubuted Denial of Service Attacks * Virusses * Trojan Horses * Malware * Hackers
These weapons can be used to obtain access or information from computer systems and are used often.