- Bomb
- Program to trigger damage
- Scheduled to run at a later date
- May be found in software for general public, especially shareware
- Data diddling
- Changing data before or as it enters the system
- Denial of service attack (DOS)
- Hackers bombard a site with more request for service than it can possible handle
- Prevents legitimate users from accessing the site
- Appearance of requests coming from many different sites simultaneously
- Piggybacking
- Original user does not sign off properly
- Intruder gains accesses to files via the original user id
- Salami technique
- Scavenging
- Search garbage and recycling bins for personal information
- Trapdoor
- Illicit program left within a completed legitimate program
- Permits unauthorized and unknown entry to the program
- Trojan horse
- Illegal instructions placed inside a legitimate program
- Program does something useful and destructive at the same time
- Zapping
- Software to bypass security systems