Classification of Hackers Methods of Cybersecurity Attack
Classification of Hackers Methods of Cybersecurity Attack
College
Classification of Hackers
Hackers can be classified into different categories based on their intent of hacking a system.
These different terms come from old Spaghetti Westerns where the bad guy wears a black
cowboy hat, and the good guy wears a white.
VIII. Hacktivist
➢ Hackers who use technology to promote social, ideological, religious, or political messages.
➢ Common activities include website defacement and denial-of-service attacks.
2. Attack
An action performed on a system to gain access and extract sensitive data.
6. Buffer Overflow
A flaw where more data is written to a buffer than it can hold.
7. Clone Phishing
Modification of a legitimate email with a false link to trick recipients into providing personal
information.
8. Cracker
Modifies software to access features deemed undesirable, such as copy protection.
11. Exploit
Software or data sequence that takes advantage of a bug or vulnerability to compromise security.
12. Firewall
A filter designed to keep unwanted intruders out of a computer system or network.
15. Malware
Umbrella term for hostile software, including viruses, worms, Trojans, ransomware, spyware, and
more.
17. Phishing
Email fraud method to gather personal and financial information from recipients.
18. Phreakers
Original computer hackers who break into telephone networks to make free calls or tap lines.
19. Rootkit
Stealthy software designed to hide processes or programs and enable continued privileged access.
22. Spam
Unsolicited email sent to a large number of recipients.
23. Spoofing
Technique to gain unauthorized access by sending messages with a fake IP address from a trusted
host.
24. Spyware
Software that gathers information about a person or organization without their knowledge.
26. Threat
Possible danger that exploits a bug or vulnerability to compromise security.
28. Virus
Malicious program capable of copying itself and causing detrimental effects.
29. Vulnerability
Weakness that allows a hacker to compromise security.
30. Worms
Self-replicating virus that resides in active memory and duplicates itself.
Simplilearn. (2023, October 11). Types of Cyber Attacks You Should Be Aware of in 2024. Retrieved June
11, 2024, from https://www.simplilearn.com/tutorials/cyber-security-tutorial/types-of-cyber-attacks.