Zusammenfassung der Ressource
learning aim b: cyber security
- key terms
- threat
- why systems are attacked
- malware
- trojan
horse
Anmerkungen:
- users are tricked into downloading it.
- rootkit
Anmerkungen:
- is a set of tools that give a hacker high level administrative control of a computer.
- ransomware
Anmerkungen:
- encrypted files stored on a computer to exort or steal money from organisations.
- spyware
Anmerkungen:
- malicious software secretly installed to collect information from someone elses computer.
- keyloggers
Anmerkungen:
- spyware that records every keystroke made on a computer to steal personal information.
- botnet
Anmerkungen:
- is an army of zombie devices used to carry out mass attacks and send spam to millions of users.
- DDOS
Anmerkungen:
- flooding a website with useless traffic to inundate and overwhelm the network.
- social engineering
Anmerkungen:
- involves tricking people into divulging valuable information about themselves.
- phishing
Anmerkungen:
- a way of attempting to acquire information by pretending to be from a trustworthy source.
- spear phishing
Anmerkungen:
- involves bespoke emails being sent to well searched victims.
- blagging
Anmerkungen:
- a blagger invents a scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information
- shoulder surfing
Anmerkungen:
- acquiring sensitive information by someone peering over a users shoulder when they are using a device.
- pharming
Anmerkungen:
- involves redirecting people to bogus look a like websites without realising it has happened.
- man in the middle attack
Anmerkungen:
- a form of eavesdropping where the attacker makes a independent connection between two victims and steals information to use fraudulently.