ICAS ICAS logo

Quicklinks

  1. About Us

    Find out about who we are and what we do here at ICAS.

  2. Find a CA

    Search our directory of individual CAs and Member organisations by name, location and professional criteria.

  3. CA Magazine

    View the latest issues of the dedicated magazine for ICAS Chartered Accountants.

  4. Contact Us

    Get in touch with ICAS by phone, email or post, with dedicated contacts for Members, Students and firms.

Login
  • Annual renewal
  • About us
  • Contact us
  • Find a CA
  1. About us
    1. Governance
  2. Members
    1. Become a member
    2. Newly qualified
    3. Manage my membership
    4. Benefits of membership
    5. Careers support
    6. Mentoring
    7. CA Wellbeing
    8. More for Members
    9. Area networks
    10. International communities
    11. Get involved
    12. Top Young CAs
    13. Career breaks
    14. ICAS podcast
    15. Newly admitted members 2022
    16. Newly admitted members 2023
  3. CA Students
    1. Student information
    2. Student resources
    3. Learning requirements
    4. Learning updates
    5. Learning blog
    6. Totum Pro | Student discount card
    7. CA Student wellbeing
  4. Become a CA
    1. How to become a CA
    2. Routes to becoming a CA
    3. CA Stories
    4. Find a training agreement
    5. Why become a CA
    6. Qualification information
    7. University exemptions
  5. Employers
    1. Become an Authorised Training Office
    2. Resources for Authorised Training Offices
    3. Professional entry
    4. Apprenticeships
  6. Find a CA
  7. ICAS events
    1. CA Summit
  8. CA magazine
  9. Insight
    1. Finance + Trust
    2. Finance + Technology
    3. Finance + EDI
    4. Finance + Mental Fitness
    5. Finance + Leadership
    6. Finance + Sustainability
  10. Professional resources
    1. Anti-money laundering
    2. Audit and assurance
    3. Brexit
    4. Charities
    5. Coronavirus
    6. Corporate and financial reporting
    7. Business and governance
    8. Ethics
    9. Insolvency
    10. ICAS Research
    11. Pensions
    12. Practice
    13. Public sector
    14. Sustainability
    15. Tax
  11. CPD - professional development
    1. CPD courses and qualifications
    2. CPD news and updates
    3. CPD support and advice
  12. Regulation
    1. Complaints and sanctions
    2. Regulatory authorisations
    3. Guidance and help sheets
    4. Regulatory monitoring
  13. CA jobs
    1. CA jobs partner: Rutherford Cross
    2. Resources for your job search
    3. Advertise with CA jobs
    4. Hays | A Trusted ICAS CA Jobs Partner
    5. Azets | What's your ambition?
  14. Work at ICAS
    1. Business centres
    2. Meet our team
    3. Benefits
    4. Vacancies
    5. Imagine your career at ICAS
  15. Contact us
    1. Technical and regulation queries
    2. ICAS logo request

Daisy-Chaining, Wardriving and Logic Bombs - 10 computer hacker terms

Header
  • LinkedIn (opens new window)
  • Twitter (opens new window)
By Alan Simpson CA

21 March 2018

Key points:

"
  • Reported instances of cybercrime, with the objective of financial gain or some subversive political motive, are becoming increasingly common.
  • Several high profile examples have been reported in the media in recent months.
  • As technology develops, more sophisticated methods are being used to perpetrate these attacks.

Reported instances of cybercrime, with the objective of financial gain or some subversive political motive, are becoming increasingly common.

Recent examples of this crime which have been reported in the media are the WannaCry attack on the NHS in mid-2017 and, more recently, on Hamilton Academical Football Club.

Here are 10 common terms to add to your vocabulary.

1. Blue hat

These are specialists who are engaged by an organisation to test a new computer system, prior to it going live, with the remit to identify any potentially vulnerable areas (bugs) which can then be eliminated (what is referred to as being debugged). Their activity is clearly beneficial to the organisation and is an example of ethical hacking.

2. Botnet

This is a portmanteau word (created from the words robot and network). It consists of a collection of internet-connected computers and peripherals over which illegal access and control has been seized on a systematic basis by hackers. Each device which has had its security penetrated is now under the control of the hacker. Botnets can be used for sending spam, to steal data and carry out denial of service attacks i.e. disrupting access to devices or networks.

3. Daisy-chaining

This is the seemingly innocuous term for an illegal activity whereby a hacker gains access to one computer system and its networks and then uses it to 'piggyback' on to other systems in the organisation causing further damage.

4. Hacktivist

A hacktivist is a person or persons (e.g. the group Anonymous) who make illegal use of computers and computer networks to advance their political beliefs.

5. Logic bombs

This is a set of instructions illegally and secretly inserted by hackers (possibly a disgruntled employee) into a software package so that when a specific condition or event occurs these illegally embedded instructions will then activate a malicious event. An example is a logic bomb which starts deleting files if the hacker is later dismissed, for any reason, from employment with the organisation.

6. Red team

This is a term originating from military wargaming and involves using an organised team of IT experts to simulate a major hacking attack on the organisation’s IT systems and networks to test its defences against hacking. A defence against this simulated attack will be made by the 'blue team'. The objective of this exercise is to reveal weaknesses in the organisation’s systems so that measures can then be taken to bolster the defences and firewalls against unfriendly hackers.

7. Rootkit

A collection of software tools that enable a hacker to gain control of a computer system or areas of software and which then conceals its existence. Rootkit can be automated and installed after a hacker has gained unauthorised system administrator access.

8. Script kiddies

These are novice hackers who lack the skill needed to write their own programs but instead use programs (or scripts) developed by others to attack computer systems and networks.

9. Vishing

This is the practice of making phone calls to a potential victim (or leaving them voicemail messages) which appear to be plausible and from a trusted organisation, such as a major bank with whom the victim has had legitimate dealings, to dupe them into disclosing personal financial information. One example of this which has featured in the media recently is where a fraudster phones an individual and pretends to be from the bank’s fraud team and tells them that their bank account has been compromised. They persuade the person to transfer their funds into a bogus account for protection against any further attempts to subvert it. The victim then gives their bank details and the account is swiftly emptied by the fraudster.

10. Wardriving

This activity involves a person driving around in a motor vehicle using a laptop computer or a smartphone to locate and potentially exploit connections to local area networks. Wardriving is considered illegal only if it is active - that is, the objective of the exercise is an attempt to illegally gain admittance to a computer network by circumventing passwords or other devices installed to prevent unauthorised access to a network. Variations on this theme include:

  • Warcycling - This is using a bicycle instead of a vehicle.
  • Warflying - This is using an aircraft (or perhaps a drone) instead of a vehicle.
2022-01-xero 2022-01-xero
ICAS logo

Footer links

  • Contact us
  • Terms and conditions
  • Modern slavery statement
  • Privacy notice
  • CA magazine

Connect with ICAS

  • Facebook (opens new window) Facebook Icon
  • Twitter (opens new window) Twitter Icon
  • LinkedIn (opens new window) LinkedIn Icon
  • Instagram (opens new window) Instagram Icon

ICAS is a member of the following bodies

  • Consultative Committee of Accountancy Bodies (opens new window) Consultative Committee of Accountancy Bodies logo
  • Chartered Accountants Worldwide (opens new window) Chartered Accountants Worldwide logo
  • Global Accounting Alliance (opens new window) Global Accounting Alliance
  • International Federation of Accountants (opens new window) IFAC
  • Access Accountancy (opens new window) Access Acountancy

Charities

  • ICAS Foundation (opens new window) ICAS Foundation
  • SCABA (opens new window) scaba

Accreditations

  • ISO 9001 - RGB (opens new window)
© ICAS 2022

The mark and designation “CA” is a registered trade mark of The Institute of Chartered Accountants of Scotland (ICAS), and is available for use in the UK and EU only to members of ICAS. If you are not a member of ICAS, you should not use the “CA” mark and designation in the UK or EU in relation to accountancy, tax or insolvency services. The mark and designation “Chartered Accountant” is a registered trade mark of ICAS, the Institute of Chartered Accountants of England and Wales and Chartered Accountants Ireland. If you are not a member of one of these organisations, you should not use the “Chartered Accountant” mark and designation in the UK or EU in relation to these services. Further restrictions on the use of these marks also apply where you are a member.

ICAS logo

Our cookie policy

ICAS.com uses cookies which are essential for our website to work. We would also like to use analytical cookies to help us improve our website and your user experience. Any data collected is anonymised. Please have a look at the further information in our cookie policy and confirm if you are happy for us to use analytical cookies: