Zusammenfassung der Ressource
Cyber Security
- Key Terms
- unauthorised access
- This refers to someone gaining entry without
permission to an organisation’s system, software
or data. This is achieved by exploiting a security
vulnerability
- Cyber Security
- refers to the range of measures that can be taken to protect
computer systems, networks and data from unauthorised
access or cyberattack.
- Threat
- A threat is an incident or an action which
is deliberate or unintended that results in
disruption, down time, or data loss
- Internal Threat
- Caused by an incident
inside an organisation
- External Threat
- Cause outside of an
organisation
- Attack
- An attack is a deliberate action, targeting
an organisation's digital system or data
- Hackers
- hacker
- someone who seeks out and
exploits these vulnerabilities.
- Black hat hacker
- someone who tries to inflict damage by
compromising security systems
- Grey hat hacker
- someone who does it for fun and
not with malicious intent
- white hat hacker
- someone who works with organisations to
strengthen the security of a system
- Types of threat
- Malware
- Malicious software
- This is an umbrella term given to software that is
designed to harm a digital system, damage data or
harvest sensitive information.
- Trojan Horse
- Users are tricked into downloading it to their
computer. Once installed the Trojan works
undercover to carry out a predetermined
task.
- Rootkit
- Designed to remotely access and control a
computer system without being detected by
security software or the user.
- Ransomware
- Encrypts files stored on a computer to
extort/demand or steal money from
organisations.
- Spyware
- Is secretly installed to collect information from
someone else's computer
- keyloggers
- spyware that records every keystroke
made on a computer to steal personal
information
- Adware
- Automatically shows adverts such as popups. Most
adware is harmless but some contain spyware such as
keyloggers
- Botnet
- Bots take control of a computer system, without
the user’s knowledge. A botnet is a large
collection of malware-infected devices
(zombies). An attacker (‘bot herder’) chooses
when to ‘wake’ the zombies to perform an attack.
- Distributed Denial-of-Service
attack (DDoS attack)
- flooding a website with useless
traffic to inundate and overwhelm
the network
- Virus
- A piece of malicious code that attaches to a
legitimate program. It is capable of reproducing
itself and usually capable of causing great harm to
files or other programs on the same computer
- Worm
- Worms get around by exploiting vulnerabilities in
operating systems and attaching themselves to emails.
They self replicate at a tremendous rate, using up hard
drive space and bandwidth, overloading servers.
- Social engineering
- is a set of methods used by
cybercriminals to deceive individuals
into handing over information that they
can use for fraudulent purposes
- Shoulder surfing/shouldering
- It involves the attacker watching the victim
while they provide sensitive information
- Phishing
- is an attack in which the victim receives an email
disguised to look as if it has come from a reputable
source, in order to trick them into giving up valuable
data. The email usually provides a link to another
website where the information can be inputted.
- Pharming
- is when a victim redirects the user from a genuine
website to a fake one. Some pharming sites are so
expertly copied from the genuine website that it is
very difficult to identity therefore this is carried out
without the user knowing about it
- Blagging/ pretexting
- is an attack in which the perpetrator invents a
scenario in order to convince the victim to give
them data or money.
- Tailgating/ Piggybanking
- Trying to gain access to a secure
room or building.
- Baiting
- Cyber criminals make a promise of goods to get the
information that they need.
- Quid pro quo
- Cyber criminals make a promise of a service to get the
information that they need.