is a form of harassment using electronic forms of contact. include posting rumors about a person, threats, and sexual remarks; disclose victims’ personal information. Electronic harassment can remain “virtually” anonymous. Individuals now have the ability to hide behind some measure of anonymity when using their personal computer or cellular phone to bully another individual.
Anti Cyber Squatting
Is registering, trafficking in, or using an Internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.
They offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price.
is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization including divorce and family law issues. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten, embarrass or harass.
Is limited to actions by individuals, independent groups, or organizations. Any form of cyber warfare conducted by governments and states would be regulated and punishable under international law. with the intention to cause harm or further social, ideological, religious, political or similar objectives.
Means to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.
Is used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general.
These attacks attempt to penetrate a network by using wireless or evading WLAN access control measures, like AP MAC filters and 802.1X port access controls. Access control attacks.
SQL injection attacks allow attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server.
SQL Injection is very common with PHP and ASP applications due to the prevalence of older functional interfaces. Due to the nature of programmatic interfaces available, J2EE and ASP.NET applications are less likely to have easily exploited SQL injections.
The severity of SQL Injection attacks is limited by the attacker’s skill and imagination, and to a lesser extent, defense in depth countermeasures, such as low privilege connections to the database server and so on. In general, consider SQL Injection a high impact severity.