Zusammenfassung der Ressource
Cyber Security
- key terms
- Threats
- A Threat is an action which is
deliberated that results in
disruption, down time and/or
data loss
- Internal Threat
- can be caused by an
incident inside an
organisation
- External Threat
- can be caused outside
of the organisation
- Attack
- An attack is a deliberate action,
targeting an organisation's
digital systems and/or data
- Unauthorised Access
- Unaurthorised access refers to
someone getting/gaining entry
without permission to an
organisations system, software
and/or data
- This is achieved by exploiting a
security's vunerability
- Cyber Security
- Cyber Security is a range
of measures that can be
taken to protect a
computer and its
systems, network and
data from cyberattacks
and unorthorised access
- Hackers
- Hacker
- A Hacker is someone who
seeks out to exploit these
vunerabilities
- Black Hat Hacker
- A Black Hat Hacker is
someone who tries to inflict
damage by compromising
security systems
- Grey Hat Hacker
- A Grey Hat Hacker is someone who
does it for fun and doesn't do it with
malicious intent
- White Hat Hacker
- A White Hat Hacker is someone
who works with organisations
to strengthen the security of
their systems
- Types Of Threats
- Malware
- Virus
- This is a piece of malicious code that attaches
to a legitimate program. it's capable of
reproducing itself and usually capable of
causing great harm to data and/or other
program files in the computer
- Worm
- Worms get around data by
exploiting vunerabilities in
operationg systems and
attaching themselves to emails
- Worms self replicate at a
tremedous rate, using up hard
drive/ SSD space and bandwidth,
overloading servers
- Malicious Software
- This is an umbrella term given to a
software that is designed to harm a
digital system, damage data and/or
harvest sensitive information
- Rookit
- This is designed to remotley
access and control a computer
system without being detected by
security software or the user of
the computer
- Spyware
- Spyware is secretly installed
to collect information from
someone else's computer
- Keyloggers
- This is spyware that tecords every keystroke
made on a computer to steal personal
information such as passwords for bank cards and
other things like this
- Adware
- Adware automatically shows adverts such as
popups, mostadware is harmless but can
contain spyware suck as keyloggers
- Botnet
- These are bots that
take control of a
computer without
the user realizing
- A botnet is a large
collection of
malware-infected devise
(zombies)
- An attacker (bot herder) chooses when
to wake the zombies to perform an
attack
- DDoS Attack
- Commenly known as Distributed
Denial-of-Service attack
- This floods a website with usless traffic
to inundate and overwhelm the network
- Trojan Horse
- this piece of sofware tricks users
into downloading it to their
computer. once it's installed the
trojan horse works undercover to
carry out a predetermind task
- Ransomeware
- Ransomeware encrypts files stored on a
computers hard drive/ ssd to extort/
demand or steal money from other
organisations
- Social Engeneering
- Shoulder Surfing/ Shouldering
- This envolves the attacher watching
the victim while they provide
sensitive information
- Phishing
- This is an attach in which the victim
recieves an email disguised to look as
it has come from a reputable source. In
order to trick them into giving up
valuable data.
- This email would usually
provide a link to another where
the information can be inputted
- Pharming
- Is when a victim redirects the
user from a genuin website to a
fake website
- Some Phariming techniques are when the page is
coppied so it looks genuin but in fact is a fake and
is very hard to identify, this means the user may
not acknolage it
- Blaggin/ Pretexting
- This is an attack in which the perperator
invents a scenario in order to convince the
victim to give them data or money
- Tailgating/ piggybacking
- This is trying to gain access to
a secure room or building
- Baiting
- Cyber criminals make a promise
of goods to get the information
that they need
- Quid Pro Qou
- Cyber criminals make a
promise of a service to get
the information that they
need