Zusammenfassung der Ressource
Cyber security
- key terms
- attack
- an attack is a deliberate
action targeting an
organisation's digital system
or data
- threats
- A threat is an incident or an action which is
deliberate or unintended that results in the
distribution,down time or loss of data
- Internal threat:
caused by an
incident inside
an organisation
- External threat:
caused outside
the organisation
- cyber security
- refers to the range of
measures that can be taken
to protect computer
systems, networks and data
from unauthorised access
or cyber attack
- unauthorised access
- this refers to
someone
gaining entry
without
permission to
an
organisation's
system,
software or
data
- achieved by
exploiting a
security
vulnerability
- hacker
- someone who seeks out and
exploits these vulnerabilities
- black hat
hacker
- someone
who tries to
inflict
damage by
compromising
security
system
- grey hat hacker
- someone who does it
for fun and not with
malicious intent
- white hat hacker
- someone who works
with organisations to
strengthen the security
of a system
- types of threats
- malware
- malicious soft ware
- this is an umbrella
term given to
software that is
designed to harm a
digital
system,damage data
or harvest sensitive
information
- virus
- a piece of malicious code that attaches to a
legitimate program. it is capable of reproducing
itself and usually capable of causing great harm
to files or other programs on the same computer
- worm
- they get around by exploiting
vulnerabilities in operating
systems and attaching
themselves to emails. they self
replicate at a tremendous rate,
using up hard drive space and
bandwidth, overloading servers
- trojan Horse
- users are tricked into downloading it to
their computer,once installed it works
undercover to carry out a predetermined
task.
- rootkit
- designed to remotely access
and control a computer system
without being detected by
security software or the user.
- ransomware
- encrypts files stored on a
computer to
extort/demand or steal
money from
organisations
- spyware
- is secretly installed to collect
information form someone
else's computer
- keyloggers
- spyware that records every
keystroke made on a
computer to steal personal
information
- adware
- automatically shows adverts such as popups
- most adware is harmless but some
contain spyware such as keyloggers
- botnet
- take control of computer systems
, without the user's knowledge.
- a botnet is a large collection of
malware-infected devices
(zombies)
- an attacker ('bot
herder') chooses
when to 'wake'
the zombies to
perform an
attacker
- ddos
- flooding a website with
useless traffic to inundate
and overwhelm the
network
- social engineering
- is a set of methods used by
cybercriminals to deceive
individuals into handing
over information that they
can use for fraudlent
purposes
- shoulder
surfing/shouldering
- it involves the
attacker watching
the victim while they
provide sensitive
information
- phising
- an attack in which the
victim receives an email
disguised to look as if it
has come from a
reputable source, in
order to trick them into
giving up valuable data.
- the email usually
provides a link to
another website where
the information can be
inputted
- pharming
- is when a victim
redirects the
user from a
genuine website
to a fake one
- some pharming sites are so expertly copied
from the genuine website that it is very
difficult to identify therefore this is carried
out without the user knowing about it
- blagging/pretexting
- is an attack in which the
perpetrator invents a scenario in
order to convince the victim to
give them data or money
- tailgating/piggybacking
- trying to gain access
to a secure room or
building
- bating
- cyber criminals make a
promise of goods to get
their information that
they need
- quid pro qou
- cyber criminals make a promise of
a service to get the information
that they need